Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Module 1: Introduction to Network Security
- Understanding Network Topology; Types of Networks and the OSI Model
Module 2: Network Protocols
- Overview of Network Protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, and HTTP
- IP: Potential Attacks and Countermeasures
- TCP and UDP: Attacks and Countermeasures
- FTP, TFTP, TELNET, SMTP: Identifying Vulnerabilities
Module 3: Security Policy
- Defining Security Policy
- Characteristics of a Strong Security Policy
- Structure of a Security Policy
- Developing and Implementing Security Policies
- Essential Requirements for Effective Security Policies
Module 4: Physical Security
- Physical Security Threats
- Locks and Key Management
- TEMPEST Standards
- Fire Safety: Suppression and Gaseous Emission Systems
- Laptop Security: Physical Countermeasures
- Biometric Devices
- PC Security: Controlling Boot Access
Module 5: Network Attacks
- Current Attack Statistics
- Defining Key Terms: Threats, Attacks, and Exploits
- Classification of Hackers and Attack Types
- Spoofing, Spamming, Eavesdropping, Phishing, War Dialing, and Password Cracking
- Web Page Defacement, SQL Injection, Wire Tapping, and Buffer Overflow
- War Driving, War Chalking, and War Flying
- Denial of Service (DoS) and Distributed DoS Attacks
Module 6: Intrusion Detection System
- Key Characteristics of IDS
- Host-Based IDS vs. Network-Based IDS
- IDS Detection Methods and Signature Types
- Intrusion Prevention System (IPS)
- Comparing IDS and IPS
- IPS Tools
Module 7: Firewalls
- Handling Threats and Security Tasks
- Protection Against Hacking
- Centralization and Documentation
- Multi-Layer Firewall Protection
- Packet Filtering and Stateful Packet Filtering
- Multi-Firewall DMZ Configurations
- Specialty Firewalls and Reverse Firewalls
Module 8: Packet Filtering and Proxy Servers
- Network Address Translation (NAT)
- Application Layer Gateways and Proxying
- Virtual Private Networks and the Authentication Process
Module 9: Bastion Host and Honeypots
- Bastion Hosts
- Honeypots and Honeynets
Module 10: Hardening Routers
- Internetworking Operating Systems (IOS)
- Router Troubleshooting
- Router Hardening Techniques
- Components of Router Security
- Router Security Testing Tools
Module 11: Hardening Operating Systems Security
- Windows Security Fundamentals
- Objects and Permissions
- NTFS File System Permissions
- Active Directory
- Kerberos Authentication and Security
- IP Security
- Linux Security
Module 12: Patch Management
- Red Hat Up2date Patch Management Utility Installation Steps
- Microsoft Patch Management Process and Windows Update Services
- Patch Management Tools: Qchain
- Patch Management Tool: Microsoft Baseline Security Analyzer
- Other Patch Management Tools
Module 13: Application Security
- Securing Web Applications
- IPSec and SSL Security
- Writing Secure Code: Best Practices
- Remote Administration Security
Module 14: Web Security
- Network Devices and Design
- Modifying Network Addresses
- Client Authorization and Secure Client Transmissions
- Portable Applications
- Malicious Code Detection
- Browser Security Settings
- Common Gateway Interface (CGI)
- Web Application Input Data Validation and Buffer Overflows
Module 15: E-Mail Security
- Components of an Email
- Email Protocols
- Email Security Risks
- Strategies for Defending Against Email Security Risks
Module 16: Encryption
- Firewalls Implementing Encryption
- Maintaining Confidentiality
- Digital Certificates
- Public and Private Keys (including PGP)
- Selecting Key Sizes
- Analyzing Popular Encryption Schemes, Including IPSec
Module 17: Virtual Private Networks
- VPN Tunneling Protocols
- PPTP and L2TP
- VPN Security
Module 18: WLAN
- Wireless Network Types
- Antennas
- WLAN Standards
- Bluetooth and Ultra Wideband
- WEP Description Tools (Air Snort and WEPCrack)
- WLAN Security: WPA, TKIP, WTLS
- EAP Methods
- Advanced Encryption Standards (AES), DES, and RSA Encryption
- RADIUS and Multifactor Authentication
- Mobile Security Through Certificates
- Certificate Management Through PKI
Module 19: Creating Fault Tolerance
- Network Security: Fault Tolerance
- Reasons for Implementing Fault Tolerance
- Planning for Fault Tolerance
- Causes of System Failure
- Preventive Measures
Module 20: Incident Response
- Defining an Incident
- Step-by-Step Procedures
- Managing Incidents
- Defining Incident Response
- Six-Step Approach for Incident Handling (PICERF Methodology)
- Incident Response Team
Module 21: Disaster Recovery and Planning
- Understanding Disaster Recovery
- Disaster Recovery Planning
- Business Continuity Planning Process
- Disaster Prevention
Module 22: Network Vulnerability Assessment
- Vulnerability Assessment Overview
- Goals of Vulnerability Assessment
- Network Vulnerability Assessment Methodology
- Selecting Vulnerability Assessment Tools
Requirements
There are no specific prerequisites required to enroll in this course.
35 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.