Your Growth, Our Mission
The program prepares network administrators on network security technologies and operations to attain Defense-in-Depth network security preparedness. It covers the protect, detect and respond approach to network security. The course contains hands-on labs, based on major network security tools and techniques which will provide network administrators real world expertise on current network security technologies and operations. The study-kit provides you with over 10 GB of network security best practices, assessments and protection tools. The kit also contains templates for various network policies and a large number of white papers for additional learning.
Module 01: Computer Network and Defense Fundamentals
Network Fundamentals
Computer Network
Types of Network
Major Network Topologies
Network Components
Network Interface Card (NIC)
Repeater
Hub
Switches
Router
Bridges
Gateways
TCP/IP Networking Basics
Standard Network Models: OSI Model
Standard Network Models: TCP/IP Model
Comparing OSI and TCP/IP
TCP/IP Protocol Stack
Domain Name System (DNS)
DNS Packet Format
Transmission Control Protocol (TCP)
TCP Header Format
TCP Services
TCP Operation
Three-way hand shake
User Datagram Protocol (UDP)
UDP Operation
IP Header
IP Header: Protocol Field
What is Internet Protocol v6 (IPv6)?
IPv6 Header
Internet Control Message Protocol (ICMP)
Format of an ICMP Message
Address Resolution Protocol (ARP)
ARP Packet Format
Fiber Distributed Data Interface (FDDI)
Token Ring
IP Addressing
Classful IP Addressing
Address Classes
Reserved IP Address
Subnet Masking
Subnetting
Supernetting
IPv6 Addressing
Difference between IPv4 and IPv6
IPv4 compatible IPv6 Address
Computer Network Defense (CND)
Computer Fundamental Attributes
What CND is NOT
CND Layers
CND Layer 1: Technologies
CND Layer 2: Operations
CND Layer 3: People
Blue Teaming
Network Defense-In-Depth
Typical Secure Network Design
CND Triad
CND Process
CND Actions
CND Approaches
Module 02: Network Security Threats, Vulnerabilities, and Attacks
Essential Terminologies
Threats
Vulnerabilities
Attacks
Network Security Concerns
Why Network Security Concern Arises?
Fundamental Network Security Threats
Types of Network Security Threats
How does network security breach affects business continuity?
Network Security Vulnerabilities
Types of Network Security Vulnerabilities
Technological Vulnerabilities
Configuration Vulnerabilities
Security policy Vulnerabilities
Types of Network Security Attacks
Network Reconnaissance Attacks
Reconnaissance Attacks
Reconnaissance Attacks: ICMP Scanning
Reconnaissance Attacks: Ping Sweep
Reconnaissance Attacks: DNS Foot printing
Reconnaissance Attacks: Network Range Discovery
Reconnaissance Attacks: Network Topology Identification
Reconnaissance Attacks: Network Information Extraction using N map Scan
Reconnaissance Attacks: Port Scanning
Reconnaissance Attacks: Network Sniffing
How an Attacker Hacks the Network Using Sniffers
Reconnaissance Attacks: Social Engineering Attacks
Network Access Attacks
Password Attacks
Password Attack Techniques
Dictionary Attack
Brute Forcing Attacks
Hybrid Attack
Birthday Attack
Rainbow Table Attack
Man-in-the-Middle Attack
Replay Attack
Smurf Attack
Spam and Spim
Xmas Attack
Pharming
Privilege Escalation
DNS Poisoning
ARP Poisoning
DHCP Attacks: DHCP Starvation Attacks
DHCP Attacks: DHCP Spoofing Attack
Switch Port Stealing
Spoofing Attacks
MAC Spoofing/Duplicating
Denial of Service (DoS) Attacks
Distributed Denial-of-Service Attack (DDoS)
Malware Attacks
Malware
Types of Malware: Trojan
Types of Malware: Virus and Armored Virus
Malware Attacks
Adware
Spyware
Rootkits
Backdoors
Logic Bomb
Botnets
Ransomware
Polymorphic malware
Module 03: Network Security Controls, Protocols, and Devices
Fundamental Elements of Network Security
Network Security Controls
Network Security Protocols
Network Security Perimeter Appliances
Network Security Controls
Access Control
Access Control Terminology
Access Control Principles
Access Control System: Administrative Access Control
Access Control System: Physical Access Controls
Access Control System: Technical Access Controls
Types of Access Control
Discretionary Access Control (DAC)
Role-based Access
Network Access Control (NAC)
NAC Solutions
User Identification, Authentication, Authorization and Accounting
Types of Authentication: Password Authentication
Types of Authentication: Two-factor Authentication
Types of Authentication: Biometrics
Types of Authentication: Smart Card Authentication
Types of Authentication: Single Sign-on (SSO)
Types of Authorization Systems
Centralized Authorization
Implicit Authorization
Decentralized Authorization
Explicit Authorization
Authorization Principles
Least privilege
Separation of duties
Cryptography
Encryption
Symmetric Encryption
Asymmetric Encryption
Hashing: Data Integrity
Digital Signatures
Digital Certificates
Public Key Infrastructure (PKI)
Security Policy
Network Security Policy
Key Consideration for Network Security Policy
Types of Network Security Policies
Network Security Devices
Firewalls
DMZ
Virtual Private Network (VPN)
Proxy Server
Advantages of using Proxy Servers
Honeypot
Advantages of using Honeypots
Honeypot Tools
Intrusion Detection System (IDS)
Intrusion Prevention System (IPS)
IDS/IPS Solutions
Network Protocol Analyzer
How it Works
Advantages of using Network Protocol Analyzer
Network Protocol Analyzer Tools
Internet Content Filter
Advantages of using Internet Content Filters
Internet Content Filters
Integrated Network Security Hardware
Network Security Protocols
Transport Layer
Network Layer
Application Layer
Data Link Layer
RADIUS
TACACS+
Kerbros
Pretty Good Service (PGP) Protocol
S/MIME Protocol
How it Works
Difference between PGP and S/MIME
Secure HTTP
Hyper Text Transfer Protocol Secure (HTTPS)
Transport Layer Security (TLS)
Internet Protocol Security (IPsec)
Module 04: Network Security Policy Design and Implementation
What is Security Policy?
Hierarchy of Security Policy
Characteristics of a Good Security Policy
Contents of Security Policy
Policy Statements
Steps to Create and Implement Security Policies
Considerations before Designing a Security Policy
Design of Security Policy
Policy Implementation Checklist
Types of Information Security Policy
Enterprise information security policy (EISP
Issue specific security policy (ISSP)
System specific security policy (SSSP)
Internet Access Policies
Promiscuous Policy
Permissive Policy
Paranoid Policy
Prudent Policy
Acceptabl
| Code | Date | Venue | Fees | Action |
|---|
Prices don't include VAT
Your Growth, Our Mission