This program will be akin to learning math instead of just using a calculator.
This program teaches a fundamental understanding of the true construct of data transfer, network technologies, and software technologies so that you understand how networks operate, the processes software is automating, and how to analyze the subject material.
learn how to mitigate, harden, and defend from the attacks.
learn network defense fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN, and firewall configuration.
learn the intricacies of network traffic signature, analysis and vulnerability scanning which will help you when you design greater network security policies and successful incident response plans.
These skills will help you foster resiliency and continuity of operations during attacks.identify different issues arising during an organization-wide security planning and how to avoid and eliminate them.
Target Audience
System Administrators
System Engineers
Firewall Administrators
Network Managers
IT Managers
IT Professionals
Anyone interested in network Security technologies
Managers who want to understand cyber security core principles and practices
Course Outline
Module 1: Computer Network Defense Fundamentals
Network Fundamentals
Network Components
TCP/IP Networking Basics
TCP/IP Protocol Stack
IP Addressing
Computer Network Defense (CND)
CND Triad
CND Process
CND Actions
CND Approaches
Module 2: Network Security Threats, Vulnerabilities, and Attacks
Essential Terminologies
Network Security Concerns
Network Security Vulnerabilities
Network Reconnaissance Attacks
Network Access Attacks
Denial of Service (DoS) Attacks
Distributed Denial-of-Service Attack (DDoS)
Malware Attacks
Module 3: Network Security Controls, Protocols, and Devices
Fundamental Elements of Network Security
Network Security Controls
User Identification, Authentication, Authorization and Accounting
Types of Authorization Systems
Authorization Principles
Cryptography
Security Policy
Network Security Devices
Network Security Protocols
Module 4: Network Security Policy Design and Implementation
What is Security Policy?
Internet Access Policies
Acceptable-Use Policy
User-Account Policy
Remote-Access Policy
Information-Protection Policy
Firewall-Management Policy
Special-Access Policy
Network-Connection Policy
Business-Partner Policy
Email Security Policy
Passwords Policy
Physical Security Policy
Information System Security Policy
Bring Your Own Devices (BYOD) Policy
Software/Application Security Policy
Data Backup Policy
Confidential Data Policy
Data Classification Policy
Internet Usage Policies
Server Policy
Wireless Network Policy
Incidence Response Plan (IRP)
User Access Control Policy
Switch Security Policy
Intrusion Detection and Prevention (IDS/IPS) Policy
Personal Device Usage Policy
Encryption Policy
Router Policy
Security Policy Training and Awareness
ISO Information Security Standards
Payment Card Industry Data Security Standard (PCI-DSS)
Health Insurance Portability and Accountability Act (HIPAA)
Information Security Acts: Sarbanes Oxley Act (SOX)
Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
Other Information Security Acts and Laws
Module 5: Physical Security
Physical Security
Access Control Authentication Techniques
Physical Security Controls
Other Physical Security Measures
Workplace Security
Personnel Security: Managing Staff Hiring and Leaving Process
Laptop Security Tool: EXO5
Environmental Controls
Physical Security: Awareness /Training
Physical Security Checklists
Module 6: Host Security
Host Security
OS Security
Linux Security
Securing Network Servers
Hardening Routers and Switches
Application/software Security
Data Security
Virtualization Security
Module 7: Secure Firewall Configuration and Management
Firewalls and Concerns
What Firewalls Does?
What should you not Ignore?: Firewall Limitations
How Does a Firewall Work?
Firewall Rules
Types of Firewalls
Firewall Technologies
Firewall Topologies
Firewall Rule Set & Policies
Firewall Implementation
Firewall Administration
Firewall Logging and Auditing
Firewall Anti-evasion Techniques
Why Firewalls are Bypassed?
Full Data Traffic Normalization
Data Stream-based Inspection
Vulnerability-based Detection and Blocking
Firewall Security Recommendations and Best Practices
Firewall Security Auditing Tools
Module 8: Secure IDS Configuration and Management
Intrusions and IDPS
IDS
Types of IDS Implementation
IDS Deployment Strategies
Types of IDS Alerts
IPS
IDPS Product Selection Considerations
IDS Counterparts
Module 9: Secure VPN Configuration and Management
Understanding Virtual Private Network (VPN)
How VPN works?
Why to Establish VPN ?
VPN Components
VPN Concentrators
Types of VPN
VPN Categories
Selecting Appropriate VPN
VPN Core Functions
VPN Technologies
VPN Topologies
Common VPN Flaws
VPN Security
Quality Of Service and Performance in VPNs
Module 10: Wireless Network Defense
Wireless Terminologies
Wireless Networks
Wireless Standard
Wireless Topologies
Typical Use of Wireless Networks
Components of Wireless Network
WEP (Wired Equivalent Privacy) Encryption
WPA (Wi-Fi Protected Access) Encryption
WPA2 Encryption
WEP vs. WPA vs. WPA2
Wi-Fi Authentication Method
Wi-Fi Authentication Process Using a Centralized Authentication Server
Wireless Network Threats
Bluetooth Threats
Wireless Network Security
Wi-Fi Discovery Tools
Locating Rogue Access points
Protecting from Denial-of-Service Attacks: Interference