Assessing and Securing the Network Perimeter training

Assessing and Securing the Network Perimeter training

Course Delivery

This Course is available in the following format:

Request this course in a different delivery format

GSA Schedule 70 Saving for Government Customers

Course Overview:

Assessing and Securing the Network Perimeter training – Hands-on

In today’s security landscape, the network perimeter has ceased to be a single, easily definable boundary. In order to mount a defense from outside attacks on your network, information security experts are required to have a deep and diverse understanding of a number of technologies and applications. With Assessing and Securing the Network Perimeter training course you will learn how to identify and address potential weaknesses in realistic scenarios

The security of your network is evaluated daily. A rich question to ask is, “Are you the one doing it?” The answer, hopefully, is that someone on your side is involved in assessing the effectiveness of your defenses; however, overwhelming evidence reports that you are not the only party probing your network’s perimeter. Internet-facing systems—computers with IP addresses that can be reached from the Internet—receive between several and hundreds or even thousands of attack attempts every day. Many of these are simple scans that we know how to defend against, but others catch us by surprise, unexpectedly shifting us into incident investigation and cleanup mode.

Does your organization have access to expertise in all aspects of perimeter security, including networking, firewalls, intrusion detection systems (IDSs), intrusion prevention systems (IPSs), Virtual Private Networks (VPNs), UNIX security, and Windows security? In the pages ahead, we will show you how all these protective measures work together. Can you definitively say how secure or insecure your network is? Does everyone in your organization understand the policies related to information security and their implications? One hint that they do not is the famous expression, “But we have a firewall!” If you work in information security, you probably hear this phrase more often than you would like to, because it seems to express the opinion of many people, both technical and nontechnical.

Customize It:

● We can adapt this Assessing and Securing the Network Perimeter training course to your group’s background and work requirements at little to no added cost.
● If you are familiar with some aspects of this Assessing and Securing the Network Perimeter training course, we can omit or shorten their discussion.
● We can adjust the emphasis placed on the various topics or build the course around the mix of technologies of interest to you (including technologies other than those included in this outline).
● If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the course in manner understandable to lay audiences.

Audience / Target Group:

The target audience for this Assessing and Securing the Network Perimeter training course:

● General security practitioners
● Penetration testers
● Ethical hackers
● Web application developers
● Website designers and architects

Course Outline:

Day 1 – TCP/IP Weapons School and Defenses

• Packet Investigation Tools
• Wireshark
• dsniff
• OSI Layer 2 Attacks and Defenses
• Address Resolution Protocol (ARP)
• ARP spoofing
• Session Hijacking
• OSI Layer 3 Attacks and Defenses
• IP Header Fields
• Packet Fragmentation
• Covert Channels
• OSI Layer 4 & 5 Attacks and Defenses’
• TCP & UDP Headers
• TCP Sequence Numbers
• Port Scanning Prevention
• ICMP Traffic Control
• IPv6 Attacks and Defenses
• IPv6 Headers and Addressing
• IPv6 Attacks
• SLAAC Attacks

Day 2 – Firewall and Router Defenses

• Secure DMZ Design
• Network Address Translation
• NAT Security Concerns
• Packet Filtering
• Vulnerability of packet filtering devices
• Stateful Inspection
• Stateful Inspection Security Considerations
• Border & Gateway Routers
• Border Router Filtering Best Practices
• Proxy Devices
• Proxy Settings and Security
• Enterprise Firewall Rule Management
• Top 10 Most Common Cisco router attacks and defenses

Day 3 – Security Event Monitoring and Detection

• Intrusion Detection and Prevention
• How to write IDS Rules
• Detecting Attacks
• Network abuse signatures
• Attack Signatures
• Advanced Attack Signatures
• Remote exploit command shell signatures
• Network mapping with NMAP
• Identifying and responding to DDoS attacks
• False Positive Analysis
• False Negative Analysis
• Security Device Log Analysis
• Antivirus Log Analysis
• Unified Threat Management
• SIM Architecture
• NTP settings
• Firewall log detection

Day 4 – Operating System Security and Remote Access Security

• Virtual Private Network (VPN) Security
• IPSEC Overview
• IPSEC VPNs SSL VPNs
• VPN design considerations
• Wireless Security
• WEP, WPA, WPA2
• 802.1x Security
• Network Access Control
• NAC vs. Cisco NAC
• Securing Servers
•Patching
• Password Security
• Policy Management
• Automated hardening tools / scripts
• Securing DNS
• Securing Web Servers
• Securing SMTP
• Vulnerability Assessment

Day 5 – Securing Web Applications and Client Security

• Client Attacks
• Spearphishing
• Attacking and Defending Microsoft Office
• Attacking and Defending Internet Browsers
• OWASP Top 10 Application Security Risks
• Cross Site Scripting
• Directory Traversal
• Web Application Vulnerability Scanners

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

Print Friendly, PDF & Email