Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Module 1: Introduction to Network Security
- Understanding network topology; distinctions between network types and the OSI Model
Module 2: Network Protocols
- Core network protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, and HTTP
- IP: Analyzing attacks and corresponding countermeasures
- TCP and UDP: Analyzing attacks and corresponding countermeasures
- Vulnerabilities associated with FTP, TFTP, TELNET, and SMTP
Module 3: Security Policy
- Defining the concept of a Security Policy
- Criteria that define a robust security policy
- Structural components of a Security Policy
- Strategies for developing and implementing security policies
- Essential requirements for an effective security policy
Module 4: Physical Security
- Identifying physical security threats
- Functionality of locks and keys
- Understanding TEMPEST
- Fire safety measures: Fire suppression and gaseous emission systems
- Laptop security: Physical security countermeasures
- Utilization of biometric devices
- PC security: Managing boot access
Module 5: Network Attacks
- Analysis of current statistics
- Key definitions: Threats, attacks, and exploits
- Classification of hackers and attack types
- Techniques such as spoofing, spamming, eavesdropping, phishing, war dialing, and password cracking
- Web page defacement, SQL injection, wire tapping, and buffer overflow
- Wireless techniques: War driving, war chalking, and war flying
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks
Module 6: Intrusion Detection System
- Key characteristics of IDS
- Comparing host-based IDS versus network-based IDS
- IDS detection methods and signature types
- Introduction to Intrusion Prevention Systems
- Distinguishing between IDS and IPS
- Overview of IPS tools
Module 7: Firewalls
- Managing threats and executing security tasks
- Strategies for protection against hacking
- Importance of centralization and documentation
- Multi-layer firewall protection
- Packet filtering and stateful packet filtering techniques
- Implementing a multi-firewall DMZ
- Specialty firewalls and reverse firewalls
Module 8: Packet Filtering and Proxy Servers
- Understanding Network Address Translation (NAT)
- Application layer gateways and proxying mechanisms
- Virtual Private Networks (VPNs) and the authentication process
Module 9: Bastion Hosts and Honeypots
- Understanding the Bastion Host concept
- Honeypots and Honeynets
Module 10: Hardening Routers
- Introduction to Internetwork Operating Systems (IOS)
- Routine troubleshooting procedures for routers
- Methods for hardening a router
- Essential components of router security
- Router security testing tools
Module 11: Hardening Operating System Security
- Windows security fundamentals
- Management of objects and permissions
- NTFS file system permissions
- Active Directory administration
- Kerberos authentication and security
- IP Security configurations
- Linux security considerations
Module 12: Patch Management
- Installation steps for the Red Hat Up2date Patch Management Utility
- Microsoft patch management processes and Windows Update Services
- Patch management tools: Qchain
- Patch management tool: Microsoft Baseline Security Analyzer
- Overview of other patch management tools
Module 13: Application Security
- Securing web applications
- IPSec and SSL security implementations
- Writing secure code and adhering to best practices
- Security in remote administration
Module 14: Web Security
- Network devices and design principles
- Modifying network addresses
- Client authorization and securing client transmissions
- Handling portable applications
- Malicious code detection techniques
- Configuring browser security settings
- Common Gateway Interface (CGI)
- Web application input data validation and mitigating buffer overflows
Module 15: E-Mail Security
- Components of an email
- E-mail protocols
- E-mail security risks
- Defensive strategies against e-mail security risks
Module 16: Encryption
- Firewalls Implementation of encryption
- Maintaining data confidentiality
- Digital certificates
- Public and private keys (including PGP)
- Guidelines for choosing key sizes
- Analysis of popular encryption schemes, including IPSEC
Module 17: Virtual Private Networks
- VPN tunneling protocols
- PPTP and L2TP
- VPN security measures
Module 18: WLAN
- Types of wireless networks
- Antenna technologies
- WLAN standards
- Bluetooth and Ultra Wideband
- WEP description tools (Air Snort and WEPCrack)
- WLAN security standards: WPA, TKIP, and WTLS
- EAP methods
- Advanced Encryption Standards (AES), DES, and RSA encryption
- RADIUS and multi-factor authentication
- Mobile security through certificates
- Certificate management via PKI
Module 19: Creating Fault Tolerance
- Network security and fault tolerance
- Importance of creating fault tolerance
- Planning for fault tolerance
- Common reasons for system failure
- Preventive measures
Module 20: Incident Response
- Defining what constitutes an incident
- Step-by-step procedures
- Managing incidents effectively
- Defining Incident Response
- Six-step approach for incident handling (PICERF Methodology)
- Roles within the Incident Response Team
Module 21: Disaster Recovery and Planning
- Understanding Disaster Recovery
- Disaster Recovery Planning
- Business Continuity Planning Process
- Disaster prevention strategies
Module 22: Network Vulnerability Assessment
- Overview of vulnerability assessment
- Goals of vulnerability assessment
- Network vulnerability assessment methodology:
- Selecting appropriate vulnerability assessment tools
Requirements
There are no specific prerequisites or prior requirements needed to enroll in this course.
35 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.