Course Outline
Module 1: Introduction to Network Security
- Network topology; Network Types and the OSI Model
Module 2: Network Protocols
- Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
- IP: Attacks and Countermeasures
- TCP, UDP: Attacks and Countermeasures
- FTP, TFTP, TELNET, SMTP: Vulnerabilities
Module 3: Security Policy
- What is Security Policy?
- What Defines a good security policy
- Security Policy Structure
- Developing and Implementing security policies
- Requirements of Effective Security Policy
Module 4: Physical Security
- Physical Security Threats
- Locks and Keys
- TEMPEST
- Fire Safety: Fire Suppression, Gaseous Emission Systems
- Laptop Security: Physical Security Countermeasures
- Biometric Devices
- PC Security: Boot Access
Module 5: Network Attacks
- Current Statistics
- Defining Terms: Threats, Attack and Exploit
- Classification of Hackers and Attacks
- Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
- Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
- War Driving; War Chalking; War Flying
- Denial of Service (DOS) Attacks and Distributed DOS
Module 6: Intrusion Detection System
- Characteristics of IDS
- Host based IDS Vs Network based IDS
- IDS Detection Methods; Types of Signatures
- Intrusion Prevention System
- IDS Vs IPS
- IPS Tool
Module 7: Firewalls
- Handling threats and security tasks
- Protection against hacking
- Centralization and Documentation
- Multi-layer firewall protection
- Packet filtering and Stateful Packet Filtering
- Multi firewall DMZ
- Specialty firewalls and Reverse firewalls
Module8: Packet Filtering and Proxy Servers
- Network Address Translation
- Application layer gateway and Proxying
- Virtual Private Network and the Authentication process
Module 9: Bastion Host and Honeypots
- Bastion Host
- Honeypots and Honeynet
Module 10: Hardening Routers
- Internet work Operating Systems (IOS)
- Troubleshooting a router
- Hardening a Router
- Components of router security
- Router security: testing tools
Module 11: Hardening Operating Systems Security
- Windows Security
- Objects And Permissions
- NTFS File System Permissions
- Active Directory
- Kerberos Authentication And Security
- IP Security
- Linux
Module 12: Patch Management
- Red Hat Up2date Patch Management Utility Installation Steps
- Microsoft Patch Management Process and Windows Update Services
- Patch Management Tools: Qchain
- Patch Management Tool: Microsoft Baseline Security Analyzer
- Other Patch Management Tools
Module 13: Application Security
- Securing Web Applications
- IPSec And SSL Security
- Writing Secure Code; Best Practices
- Remote Administration Security
Module 14: Web Security
- Network Devices and Design
- Altering the Network Addresses
- Client Authorization and Secure Client Transmissions
- Portable Applications
- Malicious Code Detection
- Browser Security Settings
- Common Gateway Interface (CGI)
- Web Application Input Data Validation and Buffer Overflows
Module 15: E-Mail Security
- Components Of An Email
- E-mail protocols
- E-Mail Security Risks
- How to defend against E-Mail security risks
Module 16: Encryption
- Firewalls Implementing Encryption
- Maintaining confidentiality
- Digital certificates
- Public and Private Keys (including PGP)
- Choosing the size of keys
- Analyzing popular encryption schemes including IPSEC
Module 17: Virtual Private Networks
- VPN Tunneling Protocols
- PPTP and L2TP
- VPN Security
Module 18: WLAN
- Wireless Network Types
- Antenna
- WLAN Standards
- BlueTooth And Ultra Wideband
- WEP Description Tool (Air Snort and WEPCrack)
- WLAN Security;WPA; TKIP; WTLS
- EAP Methods
- Advanced Encryption Standards (AES); DES; RSA Encryption
- RADIUS; Multifactor Authentication
- Mobile Security Through Certificates
- Certificate Management Through PKI
Module 19: Creating Fault Tolerance
- Network Security: Fault Tolerance
- Why Create Fault Tolerance
- Planning For Fault Tolerance
- Reasons For System Failure
- Preventive Measures
Module 20: Incident Response
- What Is an Incident
- Step by Step Procedure
- Managing Incidents
- What Is an Incident Response
- Six Step Approach for Incident Handling (PICERF Methodology)
- Incident Response Team
Module 21: Disaster Recovery and Planning
- What is a Disaster Recovery
- Disaster Recovery Planning
- Business Continuity Planning Process
- Disaster Prevention
Module 22: Network Vulnerability Assessment
- Vulnerability Assessment
- Goals of vulnerability assessment
- Network vulnerability Assessment methodology:
- Selecting vulnerability assessment tools
Requirements
There are no specific requirements needed to attend this course.
Testimonials
Related Courses
Certified Chief Information Security Officer (CCISO)
35 hoursEC-Council’s CCISO Program has certified leading information security professionals around the world. A core group of high-level information security executives, the CCISO Advisory Board, contributed by forming the foundation of the program
Certified Ethical Hacker
35 hoursObjectives: To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification Target Audience: This course will significantly benefit
Incident Response
21 hours
Threat Hunting
21 hours
Certificate of Cloud Security Knowledge
14 hoursDescription: This 2-day CCSK Plus course includes all content from the CCSK Foundation course, and expands on it with extensive hands-on labs in a second day of training. Students will learn to apply their knowledge by performing a series of
C/C++ Secure Coding
21 hoursThis three day course covers the basics of securing the C/C++ code against the malicious users who may exploit many vulnerabilities in the code with memory management and input handling, the course cover the principals of writing secure
Advanced Java Security
21 hoursEven experienced Java programmers are not mastering by all means the various security services offered by Java, and are likewise not aware of the different vulnerabilities that are relevant for web applications written in Java. The course –
Standard Java Security
14 hoursDescription The Java language and the Runtime Environment (JRE) was designed to be free from the most problematic common security vulnerabilities experienced in other languages, like C/C++. Yet, software developers and architects should not only
Java and Web Application Security
21 hoursDescription Beyond solid knowledge in using Java components, even for experienced Java programmers it is essential to have a deep knowledge in web-related vulnerabilities both on server and client side, the different vulnerabilities that are
Microsoft SDL Core
14 hoursThe Combined SDL core training gives an insight into secure software design, development and testing through Microsoft Secure Development Lifecycle (SDL). It provides a level 100 overview of the fundamental building blocks of SDL, followed by design
Fundamentals of Corporate Cyber Warfare
14 hoursCyber Warfare is a growing problem for enterprises. As attackers employ more and more sophisticated technologies to launch their attacks, it is vital for companies to understand the nature of these attacks and the defense mechanisms needed to keep
ONAP for Network Orchestration and Automation
28 hoursONAP (Open Networking Automation Platform) is an open source platform for orchestrating and automating physical and virtual network elements. ONAP originated from OpenECOMP and Open-Orchestrator (Open-O) and is managed by The Linux
ONAP for Automating Telecommunication Systems and Operations
21 hoursOpen Network Automation Platform (ONAP) is an open-source software solution that automates network components for various big data services. ONAP comprises subsystems, such as design and run-time frameworks, that open virtualization opportunities
Open Source Intelligence (OSINT) Advanced
21 hoursOpen Source Intelligence (OSINT) refers to any information that can legally be gathered from free, public sources about an individual or organization. OSINT also refers to the process of collecting this data, analyzing it, and using it for
Open Source Cyber Intelligence - Introduction
7 hoursThis Introduction to Open Source Intelligence (OSINT) course will provide delegates with skills to become more efficient and effective at finding those key pieces of intelligence on the Internet and World Wide Web. The course is highly practical