Get in Touch

Course Outline

Module 1: Introduction to Network Security

  • Understanding Network Topology; Types of Networks and the OSI Model

Module 2: Network Protocols

  • Overview of Network Protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, and HTTP
  • IP: Potential Attacks and Countermeasures
  • TCP and UDP: Attacks and Countermeasures
  • FTP, TFTP, TELNET, SMTP: Identifying Vulnerabilities

Module 3: Security Policy

  • Defining Security Policy
  • Characteristics of a Strong Security Policy
  • Structure of a Security Policy
  • Developing and Implementing Security Policies
  • Essential Requirements for Effective Security Policies

Module 4: Physical Security

  • Physical Security Threats
  • Locks and Key Management
  • TEMPEST Standards
  • Fire Safety: Suppression and Gaseous Emission Systems
  • Laptop Security: Physical Countermeasures
  • Biometric Devices
  • PC Security: Controlling Boot Access

Module 5: Network Attacks

  • Current Attack Statistics
  • Defining Key Terms: Threats, Attacks, and Exploits
  • Classification of Hackers and Attack Types
  • Spoofing, Spamming, Eavesdropping, Phishing, War Dialing, and Password Cracking
  • Web Page Defacement, SQL Injection, Wire Tapping, and Buffer Overflow
  • War Driving, War Chalking, and War Flying
  • Denial of Service (DoS) and Distributed DoS Attacks

Module 6: Intrusion Detection System

  • Key Characteristics of IDS
  • Host-Based IDS vs. Network-Based IDS
  • IDS Detection Methods and Signature Types
  • Intrusion Prevention System (IPS)
  • Comparing IDS and IPS
  • IPS Tools

Module 7: Firewalls

  • Handling Threats and Security Tasks
  • Protection Against Hacking
  • Centralization and Documentation
  • Multi-Layer Firewall Protection
  • Packet Filtering and Stateful Packet Filtering
  • Multi-Firewall DMZ Configurations
  • Specialty Firewalls and Reverse Firewalls

Module 8: Packet Filtering and Proxy Servers

  • Network Address Translation (NAT)
  • Application Layer Gateways and Proxying
  • Virtual Private Networks and the Authentication Process

Module 9: Bastion Host and Honeypots

  • Bastion Hosts
  • Honeypots and Honeynets

Module 10: Hardening Routers

  • Internetworking Operating Systems (IOS)
  • Router Troubleshooting
  • Router Hardening Techniques
  • Components of Router Security
  • Router Security Testing Tools

Module 11: Hardening Operating Systems Security

  • Windows Security Fundamentals
  • Objects and Permissions
  • NTFS File System Permissions
  • Active Directory
  • Kerberos Authentication and Security
  • IP Security
  • Linux Security

Module 12: Patch Management

  • Red Hat Up2date Patch Management Utility Installation Steps
  • Microsoft Patch Management Process and Windows Update Services
  • Patch Management Tools: Qchain
  • Patch Management Tool: Microsoft Baseline Security Analyzer
  • Other Patch Management Tools

Module 13: Application Security

  • Securing Web Applications
  • IPSec and SSL Security
  • Writing Secure Code: Best Practices
  • Remote Administration Security

Module 14: Web Security

  • Network Devices and Design
  • Modifying Network Addresses
  • Client Authorization and Secure Client Transmissions
  • Portable Applications
  • Malicious Code Detection
  • Browser Security Settings
  • Common Gateway Interface (CGI)
  • Web Application Input Data Validation and Buffer Overflows

Module 15: E-Mail Security

  • Components of an Email
  • Email Protocols
  • Email Security Risks
  • Strategies for Defending Against Email Security Risks

Module 16: Encryption

  • Firewalls Implementing Encryption
  • Maintaining Confidentiality
  • Digital Certificates
  • Public and Private Keys (including PGP)
  • Selecting Key Sizes
  • Analyzing Popular Encryption Schemes, Including IPSec

Module 17: Virtual Private Networks

  • VPN Tunneling Protocols
  • PPTP and L2TP
  • VPN Security

Module 18: WLAN

  • Wireless Network Types
  • Antennas
  • WLAN Standards
  • Bluetooth and Ultra Wideband
  • WEP Description Tools (Air Snort and WEPCrack)
  • WLAN Security: WPA, TKIP, WTLS
  • EAP Methods
  • Advanced Encryption Standards (AES), DES, and RSA Encryption
  • RADIUS and Multifactor Authentication
  • Mobile Security Through Certificates
  • Certificate Management Through PKI

Module 19: Creating Fault Tolerance

  • Network Security: Fault Tolerance
  • Reasons for Implementing Fault Tolerance
  • Planning for Fault Tolerance
  • Causes of System Failure
  • Preventive Measures

Module 20: Incident Response

  • Defining an Incident
  • Step-by-Step Procedures
  • Managing Incidents
  • Defining Incident Response
  • Six-Step Approach for Incident Handling (PICERF Methodology)
  • Incident Response Team

Module 21: Disaster Recovery and Planning

  • Understanding Disaster Recovery
  • Disaster Recovery Planning
  • Business Continuity Planning Process
  • Disaster Prevention

Module 22: Network Vulnerability Assessment

  • Vulnerability Assessment Overview
  • Goals of Vulnerability Assessment
  • Network Vulnerability Assessment Methodology
  • Selecting Vulnerability Assessment Tools

Requirements

There are no specific prerequisites required to enroll in this course.

 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories