There are no specific requirements needed to attend this course.
Audience:
System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.
Module 1: Introduction to Network Security
- Network topology; Network Types and the OSI Model
Module 2: Network Protocols
- Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
- IP: Attacks and Countermeasures
- TCP, UDP: Attacks and Countermeasures
- FTP, TFTP, TELNET, SMTP: Vulnerabilities
Module 3: Security Policy
- What is Security Policy?
- What Defines a good security policy
- Security Policy Structure
- Developing and Implementing security policies
- Requirements of Effective Security Policy
Module 4: Physical Security
- Physical Security Threats
- Locks and Keys
- TEMPEST
- Fire Safety: Fire Suppression, Gaseous Emission Systems
- Laptop Security: Physical Security Countermeasures
- Biometric Devices
- PC Security: Boot Access
Module 5: Network Attacks
- Current Statistics
- Defining Terms: Threats, Attack and Exploit
- Classification of Hackers and Attacks
- Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
- Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
- War Driving; War Chalking; War Flying
- Denial of Service (DOS) Attacks and Distributed DOS
Module 6: Intrusion Detection System
- Characteristics of IDS
- Host based IDS Vs Network based IDS
- IDS Detection Methods; Types of Signatures
- Intrusion Prevention System
- IDS Vs IPS
- IPS Tool
Module 7: Firewalls
- Handling threats and security tasks
- Protection against hacking
- Centralization and Documentation
- Multi-layer firewall protection
- Packet filtering and Stateful Packet Filtering
- Multi firewall DMZ
- Specialty firewalls and Reverse firewalls
Module8: Packet Filtering and Proxy Servers
- Network Address Translation
- Application layer gateway and Proxying
- Virtual Private Network and the Authentication process
Module 9: Bastion Host and Honeypots
- Bastion Host
- Honeypots and Honeynet
Module 10: Hardening Routers
- Internet work Operating Systems (IOS)
- Troubleshooting a router
- Hardening a Router
- Components of router security
- Router security: testing tools
Module 11: Hardening Operating Systems Security
- Windows Security
- Objects And Permissions
- NTFS File System Permissions
- Active Directory
- Kerberos Authentication And Security
- IP Security
- Linux
Module 12: Patch Management
- Red Hat Up2date Patch Management Utility Installation Steps
- Microsoft Patch Management Process and Windows Update Services
- Patch Management Tools: Qchain
- Patch Management Tool: Microsoft Baseline Security Analyzer
- Other Patch Management Tools
Module 13: Application Security
- Securing Web Applications
- IPSec And SSL Security
- Writing Secure Code; Best Practices
- Remote Administration Security
Module 14: Web Security
- Network Devices and Design
- Altering the Network Addresses
- Client Authorization and Secure Client Transmissions
- Portable Applications
- Malicious Code Detection
- Browser Security Settings
- Common Gateway Interface (CGI)
- Web Application Input Data Validation and Buffer Overflows
Module 15: E-Mail Security
- Components Of An Email
- E-mail protocols
- E-Mail Security Risks
- How to defend against E-Mail security risks
Module 16: Encryption
- Firewalls Implementing Encryption
- Maintaining confidentiality
- Digital certificates
- Public and Private Keys (including PGP)
- Choosing the size of keys
- Analyzing popular encryption schemes including IPSEC
Module 17: Virtual Private Networks
- VPN Tunneling Protocols
- PPTP and L2TP
- VPN Security
Module 18: WLAN
- Wireless Network Types
- Antenna
- WLAN Standards
- BlueTooth And Ultra Wideband
- WEP Description Tool (Air Snort and WEPCrack)
- WLAN Security;WPA; TKIP; WTLS
- EAP Methods
- Advanced Encryption Standards (AES); DES; RSA Encryption
- RADIUS; Multifactor Authentication
- Mobile Security Through Certificates
- Certificate Management Through PKI
Module 19: Creating Fault Tolerance
- Network Security: Fault Tolerance
- Why Create Fault Tolerance
- Planning For Fault Tolerance
- Reasons For System Failure
- Preventive Measures
Module 20: Incident Response
- What Is an Incident
- Step by Step Procedure
- Managing Incidents
- What Is an Incident Response
- Six Step Approach for Incident Handling (PICERF Methodology)
- Incident Response Team
Module 21: Disaster Recovery and Planning
- What is a Disaster Recovery
- Disaster Recovery Planning
- Business Continuity Planning Process
- Disaster Prevention
Module 22: Network Vulnerability Assessment
- Vulnerability Assessment
- Goals of vulnerability assessment
- Network vulnerability Assessment methodology:
- Selecting vulnerability assessment tools
United Arab Emirates - Network Security Administrator
Qatar - Network Security Administrator
Egypt - Network Security Administrator
Saudi Arabia - Network Security Administrator
South Africa - Network Security Administrator
Brasil - Network Security Administrator
Canada - Network Security Administrator
中国 - Network Security Administrator
香港 - Network Security Administrator
澳門 - Network Security Administrator
台灣 - Network Security Administrator
USA - Network Security Administrator
Österreich - Network Security Administrator
Schweiz - Network Security Administrator
Deutschland - Network Security Administrator
Czech Republic - Network Security Administrator
Denmark - Network Security Administrator
Estonia - Network Security Administrator
Finland - Network Security Administrator
Greece - Network Security Administrator
Magyarország - Network Security Administrator
Ireland - Network Security Administrator
Luxembourg - Network Security Administrator
Latvia - Network Security Administrator
España - Administrador de Seguridad de Redes
Italia - Network Security Administrator
Lithuania - Network Security Administrator
Nederland - Network Security Administrator
Norway - Network Security Administrator
Portugal - Network Security Administrator
România - Network Security Administrator
Sverige - Network Security Administrator
Türkiye - Network Security Administrator
Malta - Network Security Administrator
Belgique - Network Security Administrator
France - Network Security Administrator
日本 - Network Security Administrator
Australia - Network Security Administrator
Malaysia - Network Security Administrator
New Zealand - Network Security Administrator
Philippines - Network Security Administrator
Singapore - Network Security Administrator
Thailand - Network Security Administrator
Vietnam - Network Security Administrator
India - Network Security Administrator
Argentina - Administrador de Seguridad de Redes
Chile - Administrador de Seguridad de Redes
Costa Rica - Administrador de Seguridad de Redes
Ecuador - Administrador de Seguridad de Redes
Guatemala - Administrador de Seguridad de Redes
Colombia - Administrador de Seguridad de Redes
México - Administrador de Seguridad de Redes
Panama - Administrador de Seguridad de Redes
Peru - Administrador de Seguridad de Redes
Uruguay - Administrador de Seguridad de Redes
Venezuela - Administrador de Seguridad de Redes
Polska - Network Security Administrator
United Kingdom - Network Security Administrator
South Korea - Network Security Administrator
Pakistan - Network Security Administrator
Sri Lanka - Network Security Administrator
Bulgaria - Network Security Administrator
Bolivia - Administrador de Seguridad de Redes
Indonesia - Network Security Administrator
Kazakhstan - Network Security Administrator
Moldova - Network Security Administrator
Morocco - Network Security Administrator
Tunisia - Network Security Administrator
Kuwait - Network Security Administrator
Oman - Network Security Administrator
Slovakia - Network Security Administrator
Kenya - Network Security Administrator
Nigeria - Network Security Administrator
Botswana - Network Security Administrator
Slovenia - Network Security Administrator
Croatia - Network Security Administrator
Serbia - Network Security Administrator
Bhutan - Network Security Administrator