Assessing and Securing the Perimeter Training

Assessing and Securing the Perimeter Training

Print Friendly, PDF & Email

Introduction:

Assessing and Securing the Perimeter Training Course with hands-on labs

Intensive Hands-on Assessing and Securing the Perimeter Training. Today’s network perimeter is no longer a single boundary that is easily definable.

This makes defending the perimeter a very difficult task, that requires an information security professional to know a diverse set of technologies and applications.

Duration: 5 days
 
Assessing and Securing the Perimeter Training
 
Assessing and Securing the Perimeter TrainingRelated Courses
 

Customize It:

• If you are familiar with some aspects of Assessing and Securing the Perimeter Training, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the Assessing and Securing the Perimeter Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Assessing and Securing the Perimeter Training course in manner understandable to lay audiences.

Objectives:

After completing this Assessing and Securing the Perimeter Training course, attendees will be able to:

Assessing and Securing the Perimeter Training – Course Outline:

Day 1 – TCP/IP Weapons School and Defenses

◾Packet Investigation Tools
◾Wireshark
◾dsniff
◾OSI Layer 2 Attacks and Defenses
◾Address Resolution Protocol (ARP)
◾ARP spoofing
◾Session Hijacking
◾OSI Layer 3 Attacks and Defenses
◾IP Header Fields
◾Packet Fragmentation
◾Covert Channels
◾OSI Layer 4 & 5 Attacks and Defenses’
◾TCP & UDP Headers
◾TCP Sequence Numbers
◾Port Scanning Prevention
◾ICMP Traffic Control
◾IPv6 Attacks and Defenses
◾IPv6 Headers and Addressing
◾IPv6 Attacks
◾SLAAC Attacks

Day 2 – Firewall and Router Defenses

◾Secure DMZ Design
◾Network Address Translation
◾NAT Security Concerns
◾Packet Filtering
◾Vulnerability of packet filtering devices
◾Stateful Inspection
◾Stateful Inspection Security Considerations
◾Border & Gateway Routers
◾Border Router Filtering Best Practices
◾Proxy Devices
◾Proxy Settings and Security
◾Enterprise Firewall Rule Management
◾Top 10 Most Common Cisco router attacks and defenses

Day 3 – Security Event Monitoring and Detection

◾Intrusion Detection and Prevention
◾How to write IDS Rules
◾Detecting Attacks
◾Network abuse signatures
◾Attack Signatures
◾Advanced Attack Signatures
◾Remote exploit command shell signatures
◾Network mapping with NMAP
◾Identifying and responding to DDoS attacks
◾False Positive Analysis
◾False Negative Analysis
◾Security Device Log Analysis
◾Antivirus Log Analysis
◾Unified Threat Management
◾SIM Architecture
◾NTP settings
◾Firewall log detection

Day 4 – Operating System Security and Remote Access Security

◾Virtual Private Network (VPN) Security
◾IPSEC Overview
◾IPSEC VPNs
◾SSL VPNs
◾VPN design considerations
◾Wireless Security
◾WEP, WPA, WPA2
◾802.1x Security
◾Network Access Control
◾NAC vs. Cisco NAC
◾Securing Servers
◾Patching
◾Password Security
◾Policy Management
◾Automated hardening tools / scripts
◾Securing DNS
◾Securing Web Servers
◾Securing SMTP
◾Vulnerability Assessment

Day 5 – Securing Web Applications and Client Security

◾Client Attacks
◾Spearphishing
◾Attacking and Defending Microsoft Office
◾Attacking and Defending Internet Browsers
◾OWASP Top 10 Application Security Risks
◾Cross Site Scripting
◾Directory Traversal
◾Web Application Vulnerability Scanners

Whether you are looking for general information or have a specific question, we want to help!

 
Request More Information

Time frame:

No Comments Yet.

Leave a comment

0