Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Module 1: Introduction to Network Security
- Understanding network topology, network types, and the OSI Model
Module 2: Network Protocols
- Overview of network protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, and HTTP
- IP: Common attacks and countermeasures
- TCP and UDP: Attacks and countermeasures
- Vulnerabilities in FTP, TFTP, TELNET, and SMTP
Module 3: Security Policy
- Defining a security policy
- Characteristics of an effective security policy
- Structure of a security policy
- Developing and implementing security policies
- Requirements for an effective security policy
Module 4: Physical Security
- Physical security threats
- Locks and keys
- TEMPEST
- Fire safety: Fire suppression and gaseous emission systems
- Laptop security: Physical countermeasures
- Biometric devices
- PC security: Boot access controls
Module 5: Network Attacks
- Current statistics on network attacks
- Key terms: Threats, attacks, and exploits
- Classification of hackers and attack types
- Techniques: Spoofing, spamming, eavesdropping, phishing, war dialing, and password cracking
- Web page defacement, SQL injection, wiretapping, and buffer overflow
- War driving, war chalking, and war flying
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks
Module 6: Intrusion Detection System
- Characteristics of IDS
- Host-based vs. network-based IDS
- IDS detection methods and signature types
- Intrusion Prevention Systems
- Differences between IDS and IPS
- IPS tools
Module 7: Firewalls
- Handling threats and security tasks
- Protection against hacking
- Centralization and documentation
- Multi-layer firewall protection
- Packet filtering and stateful packet filtering
- Multi-firewall DMZ configurations
- Specialty firewalls and reverse firewalls
Module 8: Packet Filtering and Proxy Servers
- Network Address Translation (NAT)
- Application layer gateways and proxying
- Virtual Private Networks and the authentication process
Module 9: Bastion Host and Honeypots
- Bastion hosts
- Honeypots and honeynets
Module 10: Hardening Routers
- Internetwork Operating System (IOS)
- Router troubleshooting
- Hardening a router
- Components of router security
- Router security testing tools
Module 11: Hardening Operating System Security
- Windows security fundamentals
- Objects and permissions
- NTFS file system permissions
- Active Directory
- Kerberos authentication and security
- IP security
- Linux security considerations
Module 12: Patch Management
- Installation steps for Red Hat Up2date patch management utility
- Microsoft patch management process and Windows Update Services
- Patch management tools: Qchain
- Patch management tool: Microsoft Baseline Security Analyzer
- Other patch management tools
Module 13: Application Security
- Securing web applications
- IPSec and SSL security
- Writing secure code: Best practices
- Remote administration security
Module 14: Web Security
- Network devices and design
- Altering network addresses
- Client authorization and secure client transmissions
- Portable applications
- Malicious code detection
- Browser security settings
- Common Gateway Interface (CGI)
- Web application input data validation and buffer overflows
Module 15: E-Mail Security
- Components of an email
- Email protocols
- Email security risks
- Defending against email security risks
Module 16: Encryption
- Firewalls Implementing encryption
- Maintaining confidentiality
- Digital certificates
- Public and private keys (including PGP)
- Choosing key sizes
- Analyzing popular encryption schemes, including IPSec
Module 17: Virtual Private Networks
- VPN tunneling protocols
- PPTP and L2TP
- VPN security
Module 18: Wireless LAN (WLAN)
- Wireless network types
- Antennas
- WLAN standards
- Bluetooth and Ultra-Wideband
- WEP description tools (Air Snort and WEPCrack)
- WLAN security: WPA, TKIP, and WTLS
- EAP methods
- Advanced Encryption Standards (AES), DES, and RSA encryption
- RADIUS and multifactor authentication
- Mobile security through certificates
- Certificate management through PKI
Module 19: Creating Fault Tolerance
- Network security and fault tolerance
- Reasons for creating fault tolerance
- Planning for fault tolerance
- Causes of system failure
- Preventive measures
Module 20: Incident Response
- Defining an incident
- Step-by-step procedure
- Managing incidents
- Understanding incident response
- Six-step approach for incident handling (PICERF methodology)
- The incident response team
Module 21: Disaster Recovery and Planning
- Understanding disaster recovery
- Disaster recovery planning
- Business continuity planning process
- Disaster prevention
Module 22: Network Vulnerability Assessment
- Vulnerability assessment
- Goals of vulnerability assessment
- Network vulnerability assessment methodology
- Selecting vulnerability assessment tools
Requirements
No specific prerequisites are required to enroll in this course.
35 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.