IPv6 Security Training

IPv6 Security Training

Print Friendly, PDF & Email

Introduction:

IPv6 Security Training Course with Hands-on Labs

IPv6 Security Training provides a framework for IPv6 end-to-end security architecture and implementation issues. IPv6 security course provides the essential needs in managing a IPv6 network audit and vulnerability assessment. It provides a formal framework for finding and eliminating IPv6 network security threats, ensuring that no vulnerabilities are overlooked.

IPv6 Security Training provides guidance for avoiding IPv6 security problems, identifying specific IPv6 security deficiencies, explore IPv6 vulnerabilities and exploiting. IPv6 security class also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in the course, you can pinpoint what individual parts of your IPv6 network need to be hardened and learn about IPv6 Security best practices.

IPv6 Security Topics Covered:

• Major security issues faced when upgrading to IPv6 network
• IPv6 Packet Structures and Vulnerability
• Issues with IPv6 Packets over IPv4 Networks
• Issues with Embedding an IPv4 Address in an IPv6 Header
• IPv6 Forensics
• IPv6 Security Testing Tools
• Vulnerability Testing
• Running Fuzz Testing against IPv6 Devices and Applications
• IPv6 Attacker Tools
• IPv6 Security Incidents
• Sources of Incidents
• Types of IPv6 Security Incidents
• Probes
• Scan
• Account Compromise
• Root Compromise
• Packet Sniffer
• Denial of Service (DoS) and Distributed DoS (DDoS)
• Exploitation of Trust in IPv6
• Malicious Code in IPv6

Duration: 3-4 days

IPv6 Security Training
 
IPv6 Security TrainingRelated Courses
 

Customize It:

• If you are familiar with some aspects of this IPv6 Security Training course, we can omit or shorten their discussion.
• We can adjust the emphasis placed on the various topics or build the IPv6 Security Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
• If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the IPv6 Security Training course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this IPv6 Security Training course is defined here:

• Engineers, developers, managers, risk analysts, ethical hackers and anyone else who wants to learn IPv6 security.

Objectives:

After completing this IPv6 Security Training course, attendees will be able to:

• Understand the basics of IPv6 Security
• Secure IPv6 networks against threats and attacks
• Implement security standards and processes to protect your IPv6 network
• Create a secure IPv6 infrastructure
• Plan ahead to avoid IPv6 security problems before widespread deployment
• Identify known areas of weakness in IPv6 security and the current state of attack tools and hacker skills
• Analyze and react to denial-of-service (DoS) attacks
• Understand each high-level approach to securing IPv6 and learn when to use each
• Protect service provider networks, perimeters, LANs, and host/server connections
• Harden IPv6 network devices against attack
• Utilize IPsec in IPv6 environments
• Secure mobile IPv6 networks
• Secure transition mechanisms in use during the migration from IPv4 to IPv6
• Monitor IPv6 security
• Understand the security implications of the IPv6 protocol, including issues related to ICMPv6 and the IPv6 header structure
• Protect your network against large-scale threats by using perimeter filtering techniques and service provider–focused security practices
• Understand the vulnerabilities that exist on IPv6 access networks and learn solutions for mitigating each

IPv6 Security Training – Course Syllabus:

Introduction to IPv6

◾IPv6 in a nutshell
◾Larger address space
◾Hierarchical addressing
◾Stateless and stateful address configuration
◾Built-in security
◾Extensibility
◾New IPv6 header
◾Mobility
◾Large address space
◾IPv6 Header Format
◾IPv4 Compatibility
◾IPv6 Operation
◾IPv6 Addressing Architecture
◾ICMPv6 and Neighbor Discovery Protocol
◾Using DNS and DHCP with IPv6
◾Supporting Security and Mobility with IPv6
◾Routing in IPv6 Networks
◾Using IPv6 services
◾IPv6 operation and Architecture
◾Basic transition mechanisms
◾Tunneling protocols create new risks
◾IPv6 autoconfiguration

Introduction to IPSec and Mobile IP

◾IPv4 security issues
◾Denial of service attacks (DOS)
◾Man-in-the-middle attacks
◾ARP poisoning and ICMP redirect
◾Port scanning as one of the best known reconnaissance Techniques IPv6 Features and benefits
◾Authentication and Confidentiality
◾IPsec architecture
◾The Security Policy Database (SPD)
◾Security Association Database (SAD)
◾Peer Authorization Database (PAD)
◾SA and Key Management
◾IP Traffic Processing
◾AH and ESP Headers AH and ESP security protocols
◾Tunnel mode and transport mode
◾Security policy (SP)
◾Selector
◾Security Association (SA), Key exchange protocols
◾Security Protocols
◾AH and ESP
◾Security Parameter Index (SPI)
◾Sequence Number
◾Virtual Private Networking (VPN)
◾Mobile IPv6
◾Wireless IP mobility
◾Roaming with IPv6
◾Mobile IPv6 applied to Wireless LANs, MANS and WANs
◾Basic Wireless LAN and cellular networks security
◾Mobile IP protocols and design
◾IPv6 deployment and migration

Introduction to IPv6 Security

◾IPv6 Security Essentials
◾Fundamental Principles and Strategies
◾Physical Security
◾Encryption
◾Digital Signatures
◾Public Key Infrastructure
◾Dealing with Technology Evolution
◾Network Security Awareness
◾Developing Security Policies, Assessments and Procedures
◾IPv6 Security Considerations and Recommendations
◾IPv6 Neighbor Discovery trust models and threats
◾Implementing Security for IPv6, Cisco Documentation
◾Security Implication of Mixed IPv4/IPv6 Network
◾IPv6 end-to-end security
◾IPv6 headers
◾IPv6 Extension Headers
◾Fragmentation
◾Routing Header
◾Privacy
◾Managing privacy extensions
◾IPsec, VPNs, IKE, PKI
◾IPv6 autoconfiguration creates addressing complexity

IPv6 and IPv4 Threat Comparison

◾Best-Practice Evaluation
◾Overview of IPv4 Topology and Best-Practice Security Rules
◾Threat Analysis Attacks with New Considerations in IPv6
◾Reconnaissance
◾Unauthorized Access
◾Header Manipulation and Fragmentation
◾Layer 3-Layer 4 Spoofing ARP and DHCP Attacks Broadcast Amplification Attacks (smurf)
◾Routing Attacks
◾Viruses and Worms
◾IPv6 and IPv4 Threat Comparison
◾Translation, Transition, and Tunneling Mechanisms
◾Attacks with Strong IPv4 and IPv6
◾Similarities
◾Sniffing
◾Application Layer Attacks
◾Rogue Devices
◾Man-in-the-Middle Attacks
◾Flooding
◾IPv6 and IPv4 Threat Comparison
◾IPv6 Security Considerations
◾Authorization for Automatically Assigned Addresses and Configurations
◾Protection of IP Packets
◾Host Protection from Scanning and Attacks
◾Control of What Traffic is Exchanged with the Internet
◾Reconnaissance Tools

IPv6 Network Vulnerabilities and Attacks

◾Detailed analysis of IPv6 headers
◾Elimination of NAT
◾Denial of Service (DoS) and Distributed Denial of Service (DDoS)
◾Ethernet LAN Security
◾Frame Relay Network Security: Vulnerabilities and Mitigations
◾ICMP Attacks
◾IPv6 Spoofing
◾ICMP, ICMP Attack, Ping Attack, Smurf Attack, PING Flood, Ping of Death
◾Land Attack
◾Network Security at the Data Link Layer (Layer 2) of LAN
◾Network Security at the Network Layer (Layer 3: IP)
◾Network Security at the Transport Layer (Layer 4: TCP and UDP)
◾Pharming and Anti-pharming Mitigations and Technologies
◾Phishing and Anti-phishing Mitigations and Technologies
◾Port Scan Attack
◾Public-Key or Asymmetric Cryptography
◾RIP Routing Attacks
◾Smurf Attack and Fraggle Attack
◾SPAM and Anti-Spam Technologies
◾Spyware and Anti-Spyware Mitigations and Technologies
◾TCP Connecting Hijacking: MAN-In-The-Middle Attack
◾TCP “SYN” Attack
◾TCP/IP Network Vulnerability and Security
◾UDP Flood Attack
◾Widely Used Attack Tools
◾Virus and Antivirus Technologies
◾Top Information and Networking Threats

IPV6 Security Audit & Control

◾Host- and Network-based Intrusion Detection
◾Firewalls and Honeypots
◾Vulnerability Scanners
◾Computer Security Policies
◾Password Managemen
◾Incident Handling
◾Information Warfare
◾Encryption
◾VPN’s, PKI, and PGP
◾Common Vulnerabilities in Wireless IPSec/VPN Deployments
◾Firewall Test, Port Scan, Spy Ware and Security Audit
◾Find Security Holes
◾IP VPN Services
◾Attacking IPsec VPNs
◾Check Point VPN Security Issues
◾Microsoft PPTP
◾VPN Services Countermeasures

IPv6 Risk Assessment and Auditing

◾Host and Network Based Intrusion Detection
◾Honeypots, Firewalls and Perimeter Protection
◾Security Policy
◾Information Warfare
◾Web Security
◾Network Fundamentals and IP Concepts and Behavior
◾Cisco Router Filters
◾Four Primary Threats for Perimeter Protection
◾PGP, Steganography
◾Anti-Viral Tools
◾Windows (2000, XP, NT, 98) IPv6 Security Administration and Auditing
◾IIS Security
◾Unix IPv6 Security

Firewalls, Perimeter Protection, and VPNs

◾IPv6 Stimulus/Response and Fragmentation
◾Complex IP Transports and Services
◾TCPdump, WINdump, Ethereal and Other Sniffers
◾Static Packet Filtering
◾Stateful Packet Filtering and Inspection
◾Proxies
◾Popular IPv6 Firewall Products
◾Implementing Security with Cisco Routers
◾Intrusion Detection
◾Centralized Logging
◾Firewall Log File Analysis
◾Log File Alerting
◾IPSec, SSL, and SSH
◾Designing a Secure Perimeter
◾Network and Host Based Auditing

Request More Information

Time frame:

No Comments Yet.

Leave a comment

0