Get in Touch

Course Outline

Module 1: Introduction to Network Security

  • Understanding network topology, network types, and the OSI Model

Module 2: Network Protocols

  • Overview of network protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, and HTTP
  • IP: Common attacks and countermeasures
  • TCP and UDP: Attacks and countermeasures
  • Vulnerabilities in FTP, TFTP, TELNET, and SMTP

Module 3: Security Policy

  • Defining a security policy
  • Characteristics of an effective security policy
  • Structure of a security policy
  • Developing and implementing security policies
  • Requirements for an effective security policy

Module 4: Physical Security

  • Physical security threats
  • Locks and keys
  • TEMPEST
  • Fire safety: Fire suppression and gaseous emission systems
  • Laptop security: Physical countermeasures
  • Biometric devices
  • PC security: Boot access controls

Module 5: Network Attacks

  • Current statistics on network attacks
  • Key terms: Threats, attacks, and exploits
  • Classification of hackers and attack types
  • Techniques: Spoofing, spamming, eavesdropping, phishing, war dialing, and password cracking
  • Web page defacement, SQL injection, wiretapping, and buffer overflow
  • War driving, war chalking, and war flying
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks

Module 6: Intrusion Detection System

  • Characteristics of IDS
  • Host-based vs. network-based IDS
  • IDS detection methods and signature types
  • Intrusion Prevention Systems
  • Differences between IDS and IPS
  • IPS tools

Module 7: Firewalls

  • Handling threats and security tasks
  • Protection against hacking
  • Centralization and documentation
  • Multi-layer firewall protection
  • Packet filtering and stateful packet filtering
  • Multi-firewall DMZ configurations
  • Specialty firewalls and reverse firewalls

Module 8: Packet Filtering and Proxy Servers

  • Network Address Translation (NAT)
  • Application layer gateways and proxying
  • Virtual Private Networks and the authentication process

Module 9: Bastion Host and Honeypots

  • Bastion hosts
  • Honeypots and honeynets

Module 10: Hardening Routers

  • Internetwork Operating System (IOS)
  • Router troubleshooting
  • Hardening a router
  • Components of router security
  • Router security testing tools

Module 11: Hardening Operating System Security

  • Windows security fundamentals
  • Objects and permissions
  • NTFS file system permissions
  • Active Directory
  • Kerberos authentication and security
  • IP security
  • Linux security considerations

Module 12: Patch Management

  • Installation steps for Red Hat Up2date patch management utility
  • Microsoft patch management process and Windows Update Services
  • Patch management tools: Qchain
  • Patch management tool: Microsoft Baseline Security Analyzer
  • Other patch management tools

Module 13: Application Security

  • Securing web applications
  • IPSec and SSL security
  • Writing secure code: Best practices
  • Remote administration security

Module 14: Web Security

  • Network devices and design
  • Altering network addresses
  • Client authorization and secure client transmissions
  • Portable applications
  • Malicious code detection
  • Browser security settings
  • Common Gateway Interface (CGI)
  • Web application input data validation and buffer overflows

Module 15: E-Mail Security

  • Components of an email
  • Email protocols
  • Email security risks
  • Defending against email security risks

Module 16: Encryption

  • Firewalls Implementing encryption
  • Maintaining confidentiality
  • Digital certificates
  • Public and private keys (including PGP)
  • Choosing key sizes
  • Analyzing popular encryption schemes, including IPSec

Module 17: Virtual Private Networks

  • VPN tunneling protocols
  • PPTP and L2TP
  • VPN security

Module 18: Wireless LAN (WLAN)

  • Wireless network types
  • Antennas
  • WLAN standards
  • Bluetooth and Ultra-Wideband
  • WEP description tools (Air Snort and WEPCrack)
  • WLAN security: WPA, TKIP, and WTLS
  • EAP methods
  • Advanced Encryption Standards (AES), DES, and RSA encryption
  • RADIUS and multifactor authentication
  • Mobile security through certificates
  • Certificate management through PKI

Module 19: Creating Fault Tolerance

  • Network security and fault tolerance
  • Reasons for creating fault tolerance
  • Planning for fault tolerance
  • Causes of system failure
  • Preventive measures

Module 20: Incident Response

  • Defining an incident
  • Step-by-step procedure
  • Managing incidents
  • Understanding incident response
  • Six-step approach for incident handling (PICERF methodology)
  • The incident response team

Module 21: Disaster Recovery and Planning

  • Understanding disaster recovery
  • Disaster recovery planning
  • Business continuity planning process
  • Disaster prevention

Module 22: Network Vulnerability Assessment

  • Vulnerability assessment
  • Goals of vulnerability assessment
  • Network vulnerability assessment methodology
  • Selecting vulnerability assessment tools

Requirements

No specific prerequisites are required to enroll in this course.

 35 Hours

Testimonials (1)

Upcoming Courses

Related Categories