Course Code: netsecadm
Duration: 35 hours
Prerequisites:

There are no specific requirements needed to attend this course.

Overview:

Audience:

System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies.

Course Outline:

Module 1: Introduction to Network Security

  • Network topology; Network Types and the OSI Model

Module 2: Network Protocols

  • Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP
  • IP: Attacks and Countermeasures
  • TCP, UDP: Attacks and Countermeasures
  • FTP, TFTP, TELNET, SMTP: Vulnerabilities

Module 3: Security Policy

  • What is Security Policy?
  • What Defines a good security policy
  • Security Policy Structure
  • Developing and Implementing security policies
  • Requirements of Effective Security Policy

Module 4: Physical Security

  • Physical Security Threats
  • Locks and Keys
  • TEMPEST
  • Fire Safety: Fire Suppression, Gaseous Emission Systems
  • Laptop Security: Physical Security Countermeasures
  • Biometric Devices
  • PC Security: Boot Access

Module 5: Network Attacks

  • Current Statistics
  • Defining Terms: Threats, Attack and Exploit
  • Classification of Hackers and Attacks
  • Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking
  • Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow
  • War Driving; War Chalking; War Flying
  • Denial of Service (DOS) Attacks and Distributed DOS

Module 6: Intrusion Detection System

  • Characteristics of IDS
  • Host based IDS Vs Network based IDS
  • IDS Detection Methods; Types of Signatures
  • Intrusion Prevention System
  • IDS Vs IPS
  • IPS Tool

Module 7: Firewalls

  • Handling threats and security tasks
  • Protection against hacking
  • Centralization and Documentation
  • Multi-layer firewall protection
  • Packet filtering and Stateful Packet Filtering
  • Multi firewall DMZ
  • Specialty firewalls and Reverse firewalls

Module8: Packet Filtering and Proxy Servers

  • Network Address Translation
  • Application layer gateway and Proxying
  • Virtual Private Network and the Authentication process

Module 9: Bastion Host and Honeypots

  • Bastion Host
  • Honeypots and Honeynet

Module 10: Hardening Routers

  • Internet work Operating Systems (IOS)
  • Troubleshooting a router
  • Hardening a Router
  • Components of router security
  • Router security: testing tools

Module 11: Hardening Operating Systems Security

  • Windows Security
  • Objects And Permissions
  • NTFS File System Permissions
  • Active Directory
  • Kerberos Authentication And Security
  • IP Security
  • Linux

Module 12: Patch Management

  • Red Hat Up2date Patch Management Utility Installation Steps
  • Microsoft Patch Management Process and Windows Update Services
  • Patch Management Tools: Qchain
  • Patch Management Tool: Microsoft Baseline Security Analyzer
  • Other Patch Management Tools

Module 13: Application Security

  • Securing Web Applications
  • IPSec And SSL Security
  • Writing Secure Code; Best Practices
  • Remote Administration Security

Module 14: Web Security

  • Network Devices and Design
  • Altering the Network Addresses
  • Client Authorization and Secure Client Transmissions
  • Portable Applications
  • Malicious Code Detection
  • Browser Security Settings
  • Common Gateway Interface (CGI)
  • Web Application Input Data Validation and Buffer Overflows

Module 15: E-Mail Security

  • Components Of An Email
  • E-mail protocols
  • E-Mail Security Risks
  • How to defend against E-Mail security risks

Module 16: Encryption

  • Firewalls Implementing Encryption
  • Maintaining confidentiality
  • Digital certificates
  • Public and Private Keys (including PGP)
  • Choosing the size of keys
  • Analyzing popular encryption schemes including IPSEC

Module 17: Virtual Private Networks

  • VPN Tunneling Protocols
  • PPTP and L2TP
  • VPN Security

Module 18: WLAN

  • Wireless Network Types
  • Antenna
  • WLAN Standards
  • BlueTooth And Ultra Wideband
  • WEP Description Tool (Air Snort and WEPCrack)
  • WLAN Security;WPA; TKIP; WTLS
  • EAP Methods
  • Advanced Encryption Standards (AES); DES; RSA Encryption
  • RADIUS; Multifactor Authentication
  • Mobile Security Through Certificates
  • Certificate Management Through PKI

Module 19: Creating Fault Tolerance

  • Network Security: Fault Tolerance
  • Why Create Fault Tolerance
  • Planning For Fault Tolerance
  • Reasons For System Failure
  • Preventive Measures

Module 20: Incident Response

  • What Is an Incident
  • Step by Step Procedure
  • Managing Incidents
  • What Is an Incident Response
  • Six Step Approach for Incident Handling (PICERF Methodology)
  • Incident Response Team

Module 21: Disaster Recovery and Planning

  • What is a Disaster Recovery
  • Disaster Recovery Planning
  • Business Continuity Planning Process
  • Disaster Prevention

Module 22: Network Vulnerability Assessment

  • Vulnerability Assessment
  • Goals of vulnerability assessment
  • Network vulnerability Assessment methodology:
  • Selecting vulnerability assessment tools
Sites Published:

United Arab Emirates - Network Security Administrator

Qatar - Network Security Administrator

Egypt - Network Security Administrator

Saudi Arabia - Network Security Administrator

South Africa - Network Security Administrator

Brasil - Network Security Administrator

Canada - Network Security Administrator

中国 - Network Security Administrator

香港 - Network Security Administrator

澳門 - Network Security Administrator

台灣 - Network Security Administrator

USA - Network Security Administrator

Österreich - Network Security Administrator

Schweiz - Network Security Administrator

Deutschland - Network Security Administrator

Czech Republic - Network Security Administrator

Denmark - Network Security Administrator

Estonia - Network Security Administrator

Finland - Network Security Administrator

Greece - Network Security Administrator

Magyarország - Network Security Administrator

Ireland - Network Security Administrator

Luxembourg - Network Security Administrator

Latvia - Network Security Administrator

España - Administrador de Seguridad de Redes

Italia - Network Security Administrator

Lithuania - Network Security Administrator

Nederland - Network Security Administrator

Norway - Network Security Administrator

Portugal - Network Security Administrator

România - Network Security Administrator

Sverige - Network Security Administrator

Türkiye - Network Security Administrator

Malta - Network Security Administrator

Belgique - Network Security Administrator

France - Network Security Administrator

日本 - Network Security Administrator

Australia - Network Security Administrator

Malaysia - Network Security Administrator

New Zealand - Network Security Administrator

Philippines - Network Security Administrator

Singapore - Network Security Administrator

Thailand - Network Security Administrator

Vietnam - Network Security Administrator

India - Network Security Administrator

Argentina - Administrador de Seguridad de Redes

Chile - Administrador de Seguridad de Redes

Costa Rica - Administrador de Seguridad de Redes

Ecuador - Administrador de Seguridad de Redes

Guatemala - Administrador de Seguridad de Redes

Colombia - Administrador de Seguridad de Redes

México - Administrador de Seguridad de Redes

Panama - Administrador de Seguridad de Redes

Peru - Administrador de Seguridad de Redes

Uruguay - Administrador de Seguridad de Redes

Venezuela - Administrador de Seguridad de Redes

Polska - Network Security Administrator

United Kingdom - Network Security Administrator

South Korea - Network Security Administrator

Pakistan - Network Security Administrator

Sri Lanka - Network Security Administrator

Bulgaria - Network Security Administrator

Bolivia - Administrador de Seguridad de Redes

Indonesia - Network Security Administrator

Kazakhstan - Network Security Administrator

Moldova - Network Security Administrator

Morocco - Network Security Administrator

Tunisia - Network Security Administrator

Kuwait - Network Security Administrator

Oman - Network Security Administrator

Slovakia - Network Security Administrator

Kenya - Network Security Administrator

Nigeria - Network Security Administrator

Botswana - Network Security Administrator

Slovenia - Network Security Administrator

Croatia - Network Security Administrator

Serbia - Network Security Administrator

Bhutan - Network Security Administrator

Nepal - Network Security Administrator

Uzbekistan - Network Security Administrator