COURSE CATALOG. Over a Decade of Security Training Excellence! TRAINING SERVICES

Size: px
Start display at page:

Download "COURSE CATALOG. www.fishnetsecurity.com. Over a Decade of Security Training Excellence! TRAINING SERVICES"

Transcription

1 TRAINING SERVICES Over a Decade of Security Training Excellence! 6130 Sprint Parkway, Suite 400 Overland Park, KS COURSE CATALOG

2 FishNet Security Training Services Helping Security Professionals Become Security Experts. FishNet Security Training Services has been delivering intense, focused training to the market since We specialize in delivering real-world, relevant, expert instruction to our clients. We have seen the security landscape change and take pride in our ability to constantly adapt our training offerings and instructional techniques to match real world demands. Our trainers deliver flexible, customizable training courses that fulfill you and your organization s security training needs. FishNet Security trainers don t teach straight from the book; they have the ability to adjust training delivery in real time to fit your organization s security paradigm. FISHNET SECURITY TRAINING Corporate Headquarters 6130 Sprint Parkway, Suite 400, Overland Park, KS

3 CLASSROOM TRAINING World-Class Security Training The education and training courses provided by FishNet Security are unmatched in the industry. The FishNet Security training team uses effective and cutting-edge methods to ensure a true transfer of knowledge through lecture, hands-on labs, and in-depth demonstrations. FishNet Security offers the highest value for your training dollar. 3 Students walk away with tools and techniques that can be applied immediately and provide results. They gain a detailed understanding of the intricacies of security strategy, design, implementation, operation, and governance. Classroom Training courses are held in our Authorized Training Centers distributed across the country. elearning A Library of Security Based Online Courses elearning Courses are security-focused flash courses that contain tracking elements. Our high-impact content can include animation, graphs, charts, knowledge checks, interactivity, quizzes, and in-depth exams. Each elearning program is split into segments from 10 to 30 minutes long. A program can include many different courses. All of our content can be configured to function within your environment or hosted on the FishNet-provided Learning Management System. Custom Content The elearning team has experience creating high impact custom courses that range from five minutes to five days of content. We have access to a diverse pool of FishNet Security Subject Matter Experts and consultants and can direct them to create content specific to your security policies and standards. REMOTE LIVE TRAINING On-Demand Instructor Led Training FishNet Security s Remote Live Training features the same instructors who teach our traditional Classroom Training courses. Students who take a Remote Live Training course will interact with a dedicated live instructor through two-way AV communications and online chat. Every question you ask will be answered, and you will be able to communicate with other students in your course. Group discussion, hands-on lab experience, and tailored instruction take place during Remote Live Training. Corporate Headquarters 6130 Sprint Parkway, Suite 400, Overland Park, KS

4 ONSITE TRAINING Training at Your Location FishNet Security can bring our expert trainers to your location for Onsite Training. All of our traditional Classroom Training courses are available in an Onsite Training format. That means you receive all of the benefits of FishNet Security Training classes but at your organization s campus. When you schedule an Onsite Training class, you receive instruction tailored specifically to your work environment. Instructors will help you solve the unique problems that are hindering your organization. All course lab equipment is available and can be configured to teach on equipment mapped to your organization s unique topology. ADDITIONAL COURSE INFO 4 General Class Times Classroom Training 9 a.m. to 5 p.m. Local time unless otherwise specified. Onsite Training Times are flexible to meet your needs; generally, we recommend 9 a.m. to 5 p.m. Student provided laptop required. Additional course specific supplies provided. Please contact your Inside Sales Representative or Account Executive for payment. Ways to pay: Purchase Order, Wire Transfer, or Credit Card: American Express, Visa, MasterCard. Student must be quoted before registering for class. Student must register for the class at: before attending the class. If unable to attend student MUST cancel registration three weeks in advance to avoid variable cancelation fee. Training Classes must be paid for prior to the first day of class. Payment is NOT required to register for your course. We encourage early registration to avoid course cancellation (a minimum of three weeks in advance). Classroom Training courses subject to reschedule or cancellation; do not book non-refundable travel without first verifying that your course will run. Last day to register for courses is the Tuesday prior to the Training Class week. Remote Live Classes 9 a.m. to 5 p.m. Central Time. elearning Classes Attended at the students convenience. Class times are dependent on the course requirements. Questions? Please call if... You do not see your desired course listed here. Course dates/location are not effective for you. You have more than four students to train. You are interested in an onsite quote. You would like to register for a course, but it is listed as full. Training Services on YouTube Online Store Corporate Headquarters 6130 Sprint Parkway, Suite 400, Overland Park, KS

5 OTHER INFORMATION Who We Are... 1 Remote Live Training... 4 elearning... 4 Classroom Training... 5 OnSite Training... 5 General Course Information... 5 Questions... 5 Training Locations Disclaimer COURSES 5 7Safe Certified Security Testing Associate (CSTA)... 8 Ethical Hacking:... 8 Certified Security Testing Professional (CSTP)... 9 Ethical Hacking II... 9 Certified Application Security Tester (CAST) Application Security Testing Training Certified Wireless Security Analyst (CWSA) Wireless Security Certified ISO Implementation Practitioner (CIIP) Implementing ISO Payment Card Industry Data Security Standards (PCI DSS) Implementation ISO Lead Auditor Training Course Certified Forensic Investigation Practitioner (CFIP) Forensic Investigation Training Course Certified Malware Investigator (CMI) Malware Investigation Certified Security Incident Specialist (CSIS) Computer Security Incident Investigation Certified Mac Forensics Specialist (CMFS) Applied Mac Forensics BlueCoat Blue Coat Certified Proxy Administrator (BCCPA) Blue Coat Certified Proxy Professional (BCCPP) CheckPoint VSX R Multi-Domain Security manaagement with VSX Multi-Domain Security manaagement with Provider Security Administrator (CCSA) R Security Expert (CCSE) R Security Bundle (CCSA & CCSE) R Comp TIA A Network Security Corporate Headquarters 6130 Sprint Parkway, Suite 400, Overland Park, KS

6 CWNP Wireless LAN Administration (CWNA) Wireless LAN Security (CWSP) EC Council Ethical Hacking and Countermeasures Computer Hacking Forensic Investigator F5 BIG-IP LTM v Changes in BIG-IP LTM v Troubleshooting BIG-IP LTM v BIG-IP GTM v Configuring BIG-IP with irules v BIG-IP Application Security Manager v BIG-IP Edge Gateway - Access Policy Manager v BIG-IP Edge Gateway WAN Optimization Module v F5 BIG-IP Edge Gateway WebAccelerator v FireMon FireMon Administrator FishNet Security Training Services Certified Information Systems Security Professional (CISSP) DOD Information Assurance Certification and Accreditation Process (DIACAP) Fundamentals DOD Information Assurance Certification and Accreditation Process (DIACAP) In Depth Federal Certification & Accreditation (C&A) Fundamentals Federal Certification & Accreditation (C&A) In Depth Linux Security PCI Security Awareness Package for End-Users Security Awareness for End-Users Web Application Security Awareness for End-Users elearning Security Awareness: Video Training elearning Security Awareness: Criminal Crab elearning Security Awareness: Executive Review elearning Developer Training: OWASP Top elearning Developer Training: Application Security elearning Developer Training: Secure Coding elearning Developer Training: Linux Security elearning PCI Training: Introduction to PCI elearning PCI Training: PCI-DSS elearning PCI Training: PCI Scoping elearning HIPAA Training: Introduction to HIPAA elearning Fundamentals of Corporate Communication Corporate Headquarters 6130 Sprint Parkway, Suite 400, Overland Park, KS

7 7 Juniper Introduction to JUNOS Operating System (IJOS) JUNOS Routing Essentials (JRE) JUNOS Security (JSEC) Configuring Juniper Networks Firewall / IP Sec VPN Products (CJFV) Network and Security Manager Fundamentals (NSMF) Advanced Juniper Networks IPSec VPN Implementations (AJVI) Integrating Juniper Networks Firewalls and VPN s into High-Performance Networks (IFVH) Attack Prevention with Juniper Networks Firewalls (APJF) Configuring Juniper Networks Secure Access (CJSA) Advanced Juniper Networks Secure Access (AJSA) Implementing Intrusion Detection & Prevention Products (IIDP) Configuring Unified Access Control (CUAC) McAfee Sidewinder: Firewall Enterprise System Administration Palo Alto Essentials 1: Firewall Installation, Configuration and Management Essentials 2: Extended Firewall Management Essentials Bundle: Firewall Installation, Configuration and Management + Extended Firewall Management...80 Q1 Labs Introduction to QRadar Riverbed Steelhead Appliance Deployment & Management Websense Web Security Gateway Anywhere (WSGA) Security Gateway Anywhere (ESGA) Data Security Suite (DSS) Corporate Headquarters 6130 Sprint Parkway, Suite 400, Overland Park, KS

8 Classroom Training Onsite Training 4 Day Course 7safe accredited training partner 7Safe Certified Security Testing Associate (CSTA) Ethical Hacking: The course is ideally suited to anyone with responsibility for, or with an interest in, the security of IT systems, such as: system administrators, auditors, IT security officers, information security professionals and budding penetration testers. Persons attending this course should have a working knowledge of networking concepts, Windows Server and/or UNIX, and experience with TCP/IP and the Internet. 8 In this course, practical exercises reinforce theory with each delegate having access to a Windows 2008 domain (server and workstation) along with a Linux server. Although the course demonstrates current hacking techniques, this is always done with defense in mind and countermeasures are discussed throughout. The CSTA exam (theory based) is included at the end of the course. Introduction & Networking Refresher Motivations behind hacking The hacking scene Methodology Sniffing traffic Information Discovery Useful information Sources - websites, metadata, search engines, DNS, social engineering Target Scanning Host discovery Port scanning techniques Banner grabbing Vulnerability Assessment Causes of vulnerabilities The classic buffer overflow Vulnerability tracking Scanning Client-side vulnerabilities Attacking Windows Windows enumeration Metasploit Client-side exploits Privilege Escalation Local information gathering Measploit s Meterperter Keyloggers Password storage Password extraction Password cracking techniques Cached domain credentials Windows network authentication Access tokens Pass the hash Attacking Linux Exploitation Web shells Pivoting the attack Online password cracking ARP Poisoning Man in the Middle Privilege escalation linux Standard streams Privilege ecalation by exploit Commercial penetration testing tools Password storage Password cracking Permission errors Sudo SUID Flawed shell scripts Retaining Access Backdoors Trojan Horses Delivery mechanisms Botnets Bypassing client-side security Covering Tracks Hiding backdoors Simple obfuscation Rootkits Anti-forensics Log manipulation Connection laundering Conclusions

9 Remote Live Training Classroom Training Onsite Training 2 Day Course 7safe accredited training partner 7Safe Certified Security Testing Professional (CSTP) Ethical Hacking II The course is ideal for system/network administrators, crime prevention / protection officers, auditors, security officers, information security professionals and penetration testers. Ethical Hacking: Certified Security Testing Associate (CSTA), and a basic understanding of HTTP & HTML. 9 CSTP introduces delegates to the exploitation and security auditing of web applications. It also reinforces and develops techniques from CSTA. Web application vulnerabilities can pose serious problems to an organization s security. Many do not realize how much control an attacker can gain via a simple flaw in the security of a public-facing web application. Infrastructure Penetration Testing Use of the Nikto web server scanner & Nessus Remote registry hacking & silent RAT installation Understand the Metasploit Framework, including the powerful Meterpreter payload Hacking Web Applications Find & assess weaknesses in PHP & ASP.NET web applications Learn how you can use SQL injection to bypass authentication & reveal confidential information Gain SYSTEM level access to a web server hosting a poorly secured web application Learn what web application vulnerability scanners can and can t do to map out weaknesses in web Applications Practical injection techniques used to glean, manipulate & corrupt data Materials Covered Review of professional penetration testing tools Further exercises against Windows and UNIX targets The Metasploit framework Test and exploit web applications using HTTP request & response modification Launch attacks using an HTTP proxy Further attacks using extended stored procedures Client-Side Attacks Discover the potential severity of the often underestimated XSS vulnerability Understand cross-site request forgeries Common browser & client hacking techniques used to target Internet users Attack a Windows XP Workstation Enhance attacks through spoofing Use XSS with session cookie theft to compromise a user s online identity and steal confidential information Launch a web application dictionary attack Use Metasploit s autopwn to automatically attack a user s browser Web application security, including: SQL Injection Cross-site scripting (XSS) Cross-site request forgeries (CSRF) Threats to users

10 Remote Live Training Classroom Training Onsite Training 3 Day Course 7safe accredited training partner 7Safe Certified Application Security Tester (CAST) Application Security Testing Training This course is ideally suited to individuals that have been working in an application testing (security assessment/administration) or developer environment for several months. 7Safe CSTA and CSTP courses, or possess equivalent knowledge and a practical understanding of backend web application technologies. 10 Gain in-depth knowledge on how to identify security vulnerabilities and subsequently identify the real risk of these vulnerabilities by exploiting them. This course also helps prepare you for the Council of Registered Ethical Security Testers (CREST) Certified Tester (Application) qualification. Introduction to Web Applications Authentication Authorisation Cookies HTTP protocol Overview of Google hacking Authentication Types of authentication Clear text HTTP protocol Advanced username enumeration/brute force issues Security through obscurity Authorization Session management issues Weak ACLs Cookie analysis SSL Misconfigurations SSL and mand-in-themiddle attacks TLS renegotiation, %00 byte issue MD5 collisions Security Problems with Thick Client Applications Insecure design Echo Mirage, MiTM, replaying traffic etc. Web/Application Server Issues ISS/Apache/OpenSSL exploitation Oracle Application Server exploits (bypass exclusion list etc.) Hacking with Metasploit Insecure HTTP methods WebDAV issues Cross Site Scripting Types of XSS Identifying XSS Exploiting XSS Advanced XSS exploitation with beef and XSS-Shell Secure cookie, HTTPonly Advanced XSS Pitfalls in defending XSS Fixing XSS Cross Site Request Forgery Identifying /exploiting CSRF Complicated CSRF with POST requests CSRF in web services Impact Fixing CSRF Session Fixation Cookie fixation Fault log-out funtionalities CRLF injection Proxy poisoning XSS with CRLF injection Clickjacking SQL Injection Intro to SQL injection Impact: Authentication bypass Impact: Extracting data (Blind SQL injection, UNION tricks, OOB channels) OS code execution (MS- SQL, MySQL, Oracle) SQL injection within stored procedures, parameterized statements Places whre you never thought SQLI could occur Pitfalls in defending SQL injections Fixing SQL injections Malicious File Uploads File uploads ISS zero-day Hacking unprotected application servers Vulnerable Flash Applications Insecure cross-domain requests Flash XSS Business Logic Bypass Authentication bypass Insecure coding Other logical flaws OS Code Execution Remote/Local File Inclusion File inclusion OS Code Execution Direct Object Reference Capture The Flag Session

11 Remote Live Training Classroom Training Onsite Training 2 Day Course 7safe accredited training partner 7Safe Certified Wireless Security Analyst (CWSA) Wireless Security 11 Those responsible for, or with an interest in, the security of IT systems (both wired and wireless), including but not limited to: IT managers, syetems/network administrators, IT security professionals and forensic/network investigators. Basic understanding of TCP/IP networking. Previous use of wireless networks and Linux is desirable. This wireless security training course completely revised this year gives delegates an understanding of: Different types of i networks How hackers bypass wireless security Implementing wireless security measures Wireless security training is vital when considering deployment of wireless LANs. As wireless grows in popularity and more security horror stories hit the headlines, the need to secure these networks has become ever greater. The course follows the evolution of wireless security, teaching the underlying principles so that delegates leave not only with an understanding of the current scene but also better prepared as the world of wireless inevitably changes. Wireless Network Security Introduction Overview of wireless technologies (e.g. Bluetooth, WiFi, WiMax) Wireless components and their functionality architecture and commonly used terminology Wireless Vulnerabilities The dangers of using public WiFi networks Practical exercises on the equipment and tools used to gain access Unauthorized WiFi: rogue access points Securing Wireless Networks How wireless networks can be protected against attack, including WEP, TKIP, CCMP and their relative strengths and weaknesses i and how the standard relates to WPA and WPA X including EAP authentication methods, key management and RADIUS Practical exercise creating digital certificates for i compliant network Testing the Level of Security War driving to audit WiFi networks Finding hidden networks Circumventing MAC Filtering Breaking WEP encryption Breaking WPA encryption Security considerations for Bluetooth, WiMax and RFID

12 Remote Live Training Classroom Training Onsite Training 3 Day Course 7safe accredited training partner 7Safe Certified ISO Implementation Practitioner (CIIP) Implementing ISO The course is ideal for IT, financial, HR management, computer auditors, IT security officers, information security professionals, those with an interest/responsibility for information security. None. This course helps to give an in-depth understanding of information security and how it applies to you and your organization by explaining the mysteries of areas such as information asset inventory and risk assessment. Course Highlights Why do you need certification to ISO 27001? What the Information Security Management System (ISMS) is and what it is trying to achieve Confidentiality, Integrity, Availability and Audit Overview of the stages of the ISMS Defining an Information Security Policy Defining the scope of the ISMS Identifying Information Assets What are information assets? Creating an asset classification system Undertaking a Risk Assessment Identifying asset values, threats and vulnerabilities Creating a usable and simple risk methodology Using risk tools Practical exercise - undertaking a risk assessment Results and conclusions resulting from an assessment Managing Risk Risk measurement Risk reduction and acceptance techniques Practical exercise - determining control objectives Selecting control objectives and controls Security in depth ISO control objectives and controls The application of countermeasures Practical exercise - Creating a workable counter measure Additional controls not in ISO Preparing a Statement for Applicability The need to review and audit the ISMS Auditing What does auditing achieve? How should auditing be conducted? Different types of audit The phase 1 and 2 ISO audits Certification - What is next?

13 Remote Live Training Classroom Training Onsite Training 1 Day Course 7safe accredited training partner 7Safe Payment Card Industry Data Security Standards (PCI DSS) Implementation 13 The course is intended for anyone accepting credit card payments or processing, storing or transmitting credit card data, merchants, third party service providers, acquirers, finance, internal auditors, IT, sales department staff. None. In this introductory training course, attendees will learn how the Payment Card Industry Data Security Standard (PCI DSS) is implemented. Delegates will leave the course with a clear and knowledgeable understanding of PCI DSS and will be able to use this knowledge when assisting PCI DSS assessments.. PCI Security Council objectives and documentation Specific terminology and its application to existing situations How the Standard applies to everyone involved with cardholder information How the implementation of the Standard is validated, dependent on levels of activity Cardholder data that can/cannot be held The relevance of different system components Detailed requirements of the Standard How compliance is assessed and whether compensating controls are acceptable Compilation of the Report on Compliance (ROC) Special considerations for hosting

14 Remote Live Training Classroom Training Onsite Training 5 Day Course 7safe accredited training partner 7Safe ISO Lead Auditor Training Course 14 The course is intended for those who wish to undertake and eventually lead audits of Information Security Management Systems (ISMS). It is also useful for those interested in implementation of ISO None. This training course for becoming a ISO Lead Auditor finishes with an examination for the ISO Lead Auditor qualification. Over five days, this intensive course prepares delegates for the qualification process for ISO and trains them on how to conduct audits for Certification Bodies. It also empowers them to give practical help and information to those who are working towards compliance and certification. This course is the first to be accredited by the International Register of Certified Auditors (IRCA) in association with ISO auditors Bureau Veritas. Aims and Objectives To enable attendees to undertake external audits and lead audits of Information Security Management Systems To explain to the attendees the purpose and planning procedure of making systems secure To ensure attendees understand the importance of organizing and reporting their audit findings Highlights Appreciate the importance of controlling Information Security in all types of business State the requirements and scope ISO Identify the documented management systems required to control Information Security Evaluate risk assessments for Information Security Effectively plan and undertake an audit Produce reports of their audits identifying non conformances against standard

15 Remote Live Training Classroom Training Onsite Training 3 Day Course 7safe accredited training partner 7Safe Certified Forensic Investigation Practitioner (CFIP) Forensic Investigation Training Course 15 The course is ideal for forensic and network investigators, IT security officers, law enforcement officials and crime prevention officers. Experience with Microsoft Windows. General appreciation of forensic principles, practices and software desirable. This course guides students through the process of conducting a forensic investigation and will learn the principles surrounding the collection of evidence, together with the forensic tools associated with forensic analysis.. Electronic Data Learn how data is stored to electronic devices Analyze the functionality of a computer file system Hardware and Software Addressing hardware employed during a forensic investigation Familiarization with forensic software Investigation Windows Artefacts Function, structure and operation of the Windows registry Internet history Encryption Recycle bins

16 Remote Live Training Classroom Training Onsite Training 3 Day Course 7safe accredited training partner 7Safe Certified Malware Investigator (CMI) Malware Investigation 16 The course is ideal forensic and network investigators, information security professionals, IT security officers, law enforcement officials, computer auditors, crime prevention officers. CFIP recommended but not essential. Principles and general guidelines surrounding forensic investigation, preliminary case considerations to evaluate when beginning a forensic investigation, and sound experience with Microsoft Windows. A basic understanding of TCP/ IP networking concepts is advantageous. On this 3 day practical training course, extend your knowledge beyond conventional static computer forensics analysis. You will be guided through the process of conducting malware analysis, from the principles surrounding the different analysis environments and 7Safe s malware investigation methodology to investigating network activity stemming from malicious software infection. Malicious Software How malicious software impacts computer users The operation of viruses, worms, Trojan horses, backdoors and rootkits How to examine for signs of infection How Trojan payloads can be used to bypass anti-virus software, personal and corporate firewalls Windows Registry Function, structure and operation of windows registry Investigation of malicous software locations in the registry and file system Case Scenarios Gain a practical understanding of modern malware beyond the often quoted traditional principles Mount forensic images for analysis Build virtual machines for analysis Build a network environment to carry out network forensic analysis

17 Remote Live Training Classroom Training Onsite Training 4 Day Course 7safe accredited training partner 7Safe Certified Security Incident Specialist (CSIS) Computer Security Incident Investigation 17 Those responsible or eager to become responsible for computer forensic investigation, including forensic and network investigators, IT security officers, information security professionals, law enforcement officials, crime prevention officers. 7Safe CSTA and CSTP ethical hacking courses, 7Safe CFIP and CMI forensic investigation courses or equivalent relevant experience, sound experience with Microsoft Windows, and basic understanding of TCP/IP network concepts. This 4 day technical, highly practical course is designed to equip information security specialists with the knowledge and skills to deal effectively with incident response situations. It also gives investigators valuable insight into forensic acquisition under difficult circumstances. Delegates will be guided through a real-world style scenario featuring extensive hands-on learning throughout. Forensic Acquisition Deal with systems that cannot be shut down for a variety of reasons, including encryption, business criticality and lack of physical access Acquire images of live Windows and Linux servers across networks utilizing a variety of tools Harvest data from firewalls and routers, where traditional imaging often fails Vulnerability Scanning Communication protocols, hacking methodologies and techniques Advanced hacking techniques, including hacking web applications and client side attacks Commonly used vulnerability scanning and penetration testing tools Advanced Data Analysis Conduct analysis of acquired data, live data, log files, database structures, and source code Utilize a variety of tools to extract relevant data quickly and effectively from complex technical sources Containing the Incident Applying newly acquired techniques to contain and risk manage the incident Balance the containment of an incident with the forensic recovery of the associated data

18 Remote Live Training Classroom Training Onsite Training 3 Day Course 7safe accredited training partner 7Safe Certified Mac Forensics Specialist (CMFS) Applied Mac Forensics 18 Forensic investigators who have gained experience dealing largely with Windows based systems and are now finding themselves in the situation where they increasingly need to understand the data structures and evidence potential in Mac OS X environments. Principles and general guidelines surrounding forensic investigation. Preliminary case considerations to evaluate when beginning a forensic investigation. In this intense course, detailed presentations will alternate with hands-on practical exercises, covering many relevant aspects of the Mac OS X operating systems. These are some of the key topics we will cover : Key differences between the original Mac OS operating systems and Mac OS X. As Mac OS became a Unixvariant, it introduced a whole new way of thinking about file ownership and permissions. It still kept the original Mac way of thinking in terms of storage of Metadata: Lots of it! We will have a look at what information Mac OS X stores about files and at HFS+, the new file system OS X needed to actually facilitate all that. We will also ask and answer the one file system question that is more Mac than any other: What, exactly, is a resource fork? Mac OS X adopted the GUID Partition Table scheme for its partition layout on the hard drive. Unlike Vista, which also supports GPT but does not generally use it, OS X will prefer this partitioning scheme. We will delve into par tition setup using GPT you will be interested in case your forensic tool of choice does not like GPT and does not successfully search for HFS+ partitions, either. Since Mac OS X Leopard (v10.5, October 2007), the operating system comes with a new feature forensic investigators will be interested in: Time Machine. As the operating system notoriously suggests to the user to use Time Machine to automatically create backups at fixed intervals, many Mac users will have backups created that might contain data of relevance even if the current system does not. As Apple puts it: Set it, then forget it. The user just might have, but we should not! Materials Covered Review of professional penetration testing tools Further exercises against Windows and UNIX targets The Metasploit framework Web application security, including: SQL Injection Cross-site scripting (XSS) Cross-site request forgeries (CSRF) Threats to users

19 Classroom Training Onsite Training Remote Live Training 2 Day Course Blue Coat Blue Coat Certified Proxy Administrator (BCCPA) 19 IT network or security professionals who wish to master the fundamentals of Blue Coat products with a focus on network security and who have not taken any previous Blue Coat training courses. Students should be familiar with networking essentials, such as LAN, Internet, security, and IP protocols. Basic knowledge of authentication methods is also a plus. The Blue Coat Certified ProxySG Administrator (BCCPA) course is intended for IT professionals who wish to master the fundamentals of the Blue Coat ProxySG. After completing this course, you will understand: Key concepts of network security and wide-area network (WAN) optimization The major functions of the ProxySG, how they work, and how to administer them How the ProxySG interfaces with other Blue Coat products How to get service and support from Blue Coat CERT Upon completing this course and passing an online exam (included in the cost of the course), students will become Blue Coat Certified Proxy Administrators. Blue Coat Family of Products Understanding Proxy Servers ProxySG Deployment ProxySG Licensing ProxySG Initial Setup ProxySG Management Console Services Hypertext Transfer Protocol Policy Management WebPulse Authentication Introduction Authentication using LDAP Creating Notifications Creating Exceptions Access Logging WAN Optimization Features Service and Support

20 Classroom Training Onsite Training Remote Live Training 3 Day Course Blue Coat Blue Coat Certified Proxy Professional (BCCPP) 20 IT network or security professionals who have practical experience with the ProxySG in the field and wish to master the advanced network security capabilities of Blue Coat products. Blue Coat Certified ProxySG Administrator (BCCPA) certification, or waiver exam, plus practical experience with the ProxySG in the field. Additionally, students should possess advanced knowledge of networking, security, and authentication. The Blue Coat Certified ProxySG Professional (BCCPP) Course is intended for IT professionals who wish to master the advance features of the Blue Coat ProxySG. After completing this course, you will understand: The architecture of the ProxySG How to use Content Policy Language and trace policy execution Authentication realms and how to configure them on the ProxySG How to use the ProxySG for forwarding and failover Streaming media and bandwidth management How the ProxySG works with the ProxyAV to perform anti-virus scanning How Blue Coat Director can be used to manage multiple ProxySG appliances CERT Upon completing this course and passing an online exam (included in the cost of the course), students will become Blue Coat Certified Proxy Professionals. The Blue Coat Certified ProxySG Professional (BCCPP) Course includes more complex and technical concepts and extensive hands-on practice. It covers: System Architecture Caching Architecture Services Advanced Topics Content Policy Language (CPL) Regular Expressions Managing downloads and apparent data types HTTP Details Using Authentication in Transparent Proxy Mode Understanding and Using Kerberos Authentication Advanced Authentication Guest Authentication SSL Proxy Policy Tracing Forwarding Reverse Proxy Implementation Two-Way URL Rewrite Blue Coat Director Failover Health Checks Web Cache Communication Protocol VLAN Support Managing Streaming Media Proxy Client Proxy Client Filtering ICAP Concepts

21 Classroom Training Onsite Training 2 Day Course Check Point VSX R67 21 Students who are systems administrators, security managers, or network engineers implementing VSX in an enterprise environment. Advanced networking knowledge Windows Server and/or UNIX skills Internet and TCP/IP experience CCSE and CCMSE or equivalent experience This 2-day course covers everything you need to design, install, configure and manage a virtualized security gateway based on Check Point VSX. VSX R67 Architecture and Deployment VSX R67 Management VSX Gateway Installation and Configuration VSX R67 and Layer 2 Communications VSX R67 and VLAN Tagging Deploying Virtual Systems in a Bridged Configuration VSX Gateway Clustering

22 Classroom Training Onsite Training Remote Live Training 2 Day Course Check Point Multi-Domain Security manaagement with VSX 22 Technical persons who support, install, deploy or administer Check Point Software Blades should attend this course. This could include system administrators, system engineers, security managers and network engineers. Persons attending this course should have advanced knowledge of networking, Windows Server and/or UNIX skills, Internet and TCP/IP experience CCSE and CCMSE or equivalent experience. This course covers everything you need to design, install, configure and manage a virtualized security gateway based on Check Point VSX.. Learn How To: Design and install a VSX network Install and configure Provider-1 to manage your VSX network Consolidate hundreds of security gateways onto a single hardware platform Centralize the security management of your virtual and physical environment How You Will Benefit: Configure security policies for virtual systems Easily add and extend your virtual system Plan network configurations for optimal load balancing Use VSX R67 to separate network traffic Plan a virtual network for a large data center

23 Classroom Training Onsite Training Remote Live Training 2 Day Course Check Point Multi-Domain Security manaagement with Provider-1 23 Technical persons who support, install, deploy or administer Check Point Software Blades should attend this course. This could include system administrators, system engineers, security managers and network engineers. CCSE R71 or equivalent knowledge and experience. This advanced course teaches how to implement and configure Check Point Multi-Domain Security Management (MDSM) with Provider-1 for enterprise environments. Add VSX training and certification to earn Check Point Certified Managed Security Expert. Learn How To: Install, configure and troubleshoot Multi-Domain Security Managment Apply advanced logging and MDS features Manage multiple sites with a single interface How You Will Benefit: Learn to consolidate multiple firewalls onto a single management platform Plan and implement a large-scale security deployment Use advanced migration tools to quickly migrate existing configurations Implement Global Policies, IPS and VPNs Activate advanced troubleshooting tools to resolve system level issues

24 Classroom Training Onsite Training Remote Live Training 3 Day Course Check Point Security Administrator (CCSA) R75 24 Technical persons who support, install, deploy or administer Check Point Software Blades should attend this course. This could include system administrators, system engineers, security managers and network engineers. Persons attending this course should have basic knowledge of networking, Windows Server and/or UNIX skills, Internet and TCP/IP experience. Check Point Security Administrator provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. During this course you will configure a Security Policy and learn about managing and monitoring a secure network. Learn How To: Secure communications across the internet Defend against network threats Configure security policies Protect and messaging content Manage user access to corporate LANs How You Will Benefit: Perform seamless product upgrades Back-up and restore networks Monitor suspicious network activities and analyze attacks Troubleshoot network connections Implement Identity Awareness for more granular access levels Configure permanent tunnels for remote access to corporate resources

25 Classroom Training Onsite Training Remote Live Training 3 Day Course Check Point Security Expert (CCSE) R75 25 Technical persons who support, install, deploy or administer Check Point Software Blades should attend this course. This could include system administrators, system engineers, security managers and network engineers. Technical persons who support, install, deploy or administer Check Point Software Blades should attend this course. This could include system administrators, system engineers, security managers, network engineers. Check Point Security Expert is an advanced course for Check Point s Security Gateway and Management Systems. This 3-day course provides hands-on training to achieve advanced skills necessary to manage and troubleshoot R75 Check Point Software Blades including advanced firewall, advanced user management and clustering, advanced IPsec and VPN and remote access. During this course, students will perform debugs on firewall processes and optimize VPN performance. Perform debugs on firewall processes using your knowledge of Security Gateway infrastructures including chain modules, packet flow and kernel tables Perform a backup of a Security Gateway and Management Server using the differences between backups, snapshots and upgradeexports Upgrade and troubleshoot a Management Server using a database migration Upgrade and troubleshoot a clustered Security Gateway deployment Configure SmartDirectory to incorporate user information for authentication services on the network Manage internal and external user access to resources for Remote Access of across a VPN Troubleshoot user access issues found when implementing Identity Awareness Build, test and troubleshoot a ClusterXL Load Sharing deployment on an enterprise network Build, test and troubleshoot a ClusterXL High Availability deployment on an enterprise network Build, test and troubleshoot a management HA deployment on an enterprise network Configure, maintain and troubleshoot SecureXL and CoreXL acceleration solutions on the corporate network traffic to ensure noted performance enhancement on the firewall Troubleshoot a site-site or certificate-based VPN on a corporate gateway using IKEView, VPN log files and command-line debug tools Optimize VPN performance and availability by using Link Selection and Multiple Entry Point solutions Manage and test corporate VPN tunnels to allow for greater monitoring and scalability with multiple tunnels defined in a community including other VPN providers Create events or use existing event definitions to generate reports on specific network traffic using SmartReporting and SmartEvent in order to provide industry compliance information to management Using your knowledge of SmartEvent architecture and module communication, troubleshoot report generation given commandline tools and debug0file information Lab Exercises Include: Upgrading to R75 Migrating to a clustering solution VPNs with 3rd-party certificates Active Directory configuration Remote Access with Endpoint Security VPN SmartEvent and SmartReporter

26 Classroom Training Onsite Training Remote Live Training 5 Day Course Check Point Security Bundle (CCSA & CCSE) R75 26 Technical persons who support, install, deploy or administer Check Point Software Blades should attend this course. This could include system administrators, system engineers, security managers and network engineers. Persons attending this course should have basic knowledge of networking, Windows Server and/or UNIX skills, Internet and TCP/IP experience. This bundle course efficiently combines the curriculums of both Check Point Security Administrator R75 and Check Point Security Expert R75 into a five day, boot-camp style course. Check Point Security Administrator provides an understanding of the basic concepts and skills necessary to configure Check Point Security Gateway and Management Software Blades. During this course you will configure a Security Policy and learn about managing and monitoring a secure network. In addition, you will upgrade and configure a Security Gateway to implement a virtual private network for both internal and external, remote users. Check Point Security Expert is an advanced course for Check Point s Security Gateway and Management Systems. This 3-day course provides hands-on training to achieve advanced skills necessary to manage and troubleshoot R75 Check Point Software Blades including advanced firewall, advanced user management and clustering, advanced IPsec and VPN and remote access. During this course, students will perform debugs on firewall processes and optimize VPN performance. Learn How To: Secure communications across the internet Defend against network threats Configure security policies Protect and messaging content Manage user access to corporate LANs Set up and administer High Availability clusters Troubleshoot Firewall Kernel issues Troubleshoot IPSEC VPN issues Administer Auditing and Reporting tools

27 Classroom Training Onsite Training 5 Day Course CompTIA A+ 27 Suited for those starting an IT career in maintenance, networking, installation and troubleshooting hardware. None. Lesson 1: Personal Computer Components Personal computer components System unit components Storage devices Personal computer connection methods Lesson 2: Operating System Fundamentals Personal computer operating systems Windows user interface components Windows file system management Windows system management tools Lesson 3: PC Technician Professional Best Practices Tools of the trade Electrical Safety Environmental safety and materials handling Perform preventative maintenance Diagnostics and troubleshooting Professionalism and communication Lesson 4: Installing and Configuring Peripheral Components Install and configure display devices Install and configure input devices Install and configure adapter cards Install and configure multimedia devices Lesson 5: Installing and Configuring System Components Install and configure storage devices Select and install power supplies Select and install memory Select, install and configure CPUs and cooling system units Install and configure system boards Lesson 6: Maintaining and Troubleshooting Peripheral Components Troubleshoot display devices Maintain and troubleshoot input devices Troubleshoot adapter cards Troubleshoot multimedia devices Lesson 7: Troubleshooting System Components Troubleshoot storage devices Troubleshoot power supplies Troubleshoot memory Troubleshoot CPUs and cooling systems Troubleshoot system boards Lesson 8: Installing and Configuring Operating Systems Install Microsoft Windows Upgrade Microsoft Windows Add devices to Microsoft Windows Optimize Microsoft Windows Lesson 9: Maintaining and Troubleshooting Microsoft Windows Operating system utilities Back up Microsoft Windows Troubleshooting Microsoft Windows Recover Microsoft Windows Lesson 10: Network Technologies Network concepts Network communications Network connectivity Internet technologies Lesson 11: Installing and Managing Network Connections Create network connections Install and configure web browsers Maintain and troubleshoot network connections Lesson 12: Supporting Laptops and Portable Computing Devices Laptop and portable computing device components Install and configure laptops and portable computing devices Maintain and troubleshoot laptops and portable computing devices Lesson 13: Supporting Printers Printer technologies Printer components Printer processes Install and configure printers Maintain and troubleshoot printers Lesson 14: Personal Computer Security Concepts Security fundamentals Security protection measures Data and physical security Wireless security Social engineering Lesson 15: Supporting Personal Computer Security Install and configure security measures Maintain and troubleshoot security measures

28 Classroom Training Onsite Training 5 Day Course CompTIA Network+ 28 Suited for established IT professionals managing, maintaining, troubleshooting, operating and configuring basic network infrastructure. None. Lesson 1: Network Theory Networking Terminology Network Building Blocks Standard Network Models Physical Network Topologies Logical Network Topologies Network Categories Lesson 2: Network Communications Methods Transmission Methods Media Access Methods Signaling Methods Lesson 3: Network Data Delivery Data Addressing and Delivery Delivery Techniques Lesson 4: Network Media and Hardware Bounded Network Media Unbounded Network Media Noise Control Network Connectivity Devices Wiring Distribution Components Lesson 5: Network Implementations The OSI Model Ethernet Networks Token Ring Networks Fiber Distributed Data Interface (FDDI) Networks Wireless Technologies and Standards Lesson 6: Networking with TCP/IP Families of Protocols The TCP/IP Protocol IP Address Basics Custom IP Addresses The IP Version 6 Protocol The TCP/IP Protocol Suite Lesson 7: TCP/IP Services IP Address Assignment Methods Host Name Resolution TCP/IP Utilities TCP/IP Upper-Layer Services TCP/IP Interoperability Services Lesson 8: Local Area Network Infrastructure Bridges and Switches IP Routing Static IP Routing Dynamic IP Routing Control Data Movement with Filters and VLANs Lesson 9: WAN Infrastructure WAN Switching Technologies WAN Transmission Technologies WAN Connectivity Methods Voice Over Data Systems Lesson 10: Network Security Computer Security Basics Authentication Data Encryption Protect Network Traffic with IP Security (IPsec) Internet Security Local Security Common Threats Threat Mitigation Techniques Intrusion Detection and Prevention Educate Users Lesson 11: Remote Networking Remote Network Architectures Remote Access Networking Implementations Virtual Private Networking Remote Control Computing Lesson 12: Disaster Recovery Examine Configuration Management Documentation Plan for Disaster Recovery Fault Tolerance Methods Data Backup Lesson 13: Network Data Storage Enterprise Data Storage Network-Attached Storage (NAS) Storage Area Network (SAN) Implementations Clustering Lesson 14: Network Operating Systems UNIX and Linux Operating Systems Apple Mac OS X Microsoft Operating Systems Novell Open Enterprise Server Lesson 15: Network Management Monitoring Tools Network Baselining Network Optimization Lesson 16: Network Troubleshooting Troubleshooting Models TCP/IP Troubleshooting Utilities Hardware Troubleshooting Tools Common Connectivity Issues Appendix A: Mapping Network+ Course Content to the CompTIA Network+ Exam Objectives Appendix B: Additional IP Addressing and Subnetting Practice Appendix C: CompTIA Network+ Acronyms

29 Classroom Training Onsite Training 5 Day Course CompTIA Security+ 29 Suited for established IT professionals in system security, network infrastructure, cryptography, assessments and audits. None. Lesson 1: Security Fundamentals Security building blocks Authentication methods Cryptography fundamentals Security policy fundamentals Lesson 2: Security Threats Social engineering Software-based threats Network-based threats Hardware-based threats Lesson 3: Hardening Internal Systems and Services Harden operating systems Harden directory services Harden DHCP servers Harden file and print servers Lesson 4: Hardening Internetwork Devices and Services Harden internetwork connection devices Harden DNS and BIND servers Harden web servers Harden servers Harden conferencing and messaging servers Secure file transfers Lesson 5: Securing Network Communications Protect network traffic with IP security (IPsec) Secure wireless traffic Secure the network telephony infrastructure Secure the remote access channel Lesson 6: Securing Web Applications Prevent input validation attacks Protect systems from buffer overflow attacks Implement ActiveX and Java security Protect systems from scripting attacks Implement secure cookies Harden a web browser Lesson 7: Managing Public Key Infrastructure (PKI) Install a certificate authority (CA) hierarchy Harden a certificate authority Back up a CA Restore a CA Lesson 8: Managing Certificates Enroll certificates Secure network traffic by using certificates Renew certificates Revoke certificates Back up certificates and private keys Restore certificates and private keys Lesson 9: Enforcing Organizational Security Policies Perform a risk assessment Enforce corporate security policy compliance Enforce legal compliance Enforce physical security compliance Educate users Plan for disaster recovery Conduct a security audit Lesson 10: Monitoring the Security Infrastructure Scan for vulnerabilities Monitor for security anomalies Set up a Honeypot Lesson 11: Managing Security Incidents Respond the security incidents Evidence administration Recover from a security incident Appendix A: Mapping Security+ Course Content to the Comp TIA Security+ Exam Objectives Appendix B: CompTIA Security+ Acronyms

30 Classroom Training Onsite Training Remote Live Training 5 Day Course CWNP Wireless LAN Administration (CWNA) 30 Basic networking knowledge, including OSI model and IP subnetting. This course provides a complete foundation of knowledge for entering into or advancing in the wireless networking industry. From basic RF theory to frame exchange processes, this course delivers hands on training that will benefit the novice as well as the experienced network professional. Labs Infrastructure Mode Throughput Analysis Wireless LAN Security Site Surveying Materials Covered Introduction to WLANs Radio Frequency Fundamentals RF Math and System Operating Margin Service Sets RF Power Output Regulations Power over Ethernet Wireless LAN Operation WLAN Security Analysis and Troubleshooting Coordinating Frame Transmissions Antennas Site Surveying

31 Classroom Training Onsite Training Remote Live Training 5 Day Course CWNP Wireless LAN Security (CWSP) 31 Basic wireless LAN literacy Course consists of hands on learning using the latest enterprise wireless LAN security and auditing equipment. This course addresses in detail the most up-to-date WLAN intrusion and DOS tools and techniques, functionality of the i amendment to the standard, the inner-workings of each EAP type used with wireless LANs today, and every class and type of WLAN security solution available on the market - from wireless intrusion prevention systems to wireless network management systems. Students who complete the course will acquire the necessary skills for implementing and managing wireless security in the enterprise by creating layer2 and layer3 hardware and software solutions with tools from the following industry leading manufacturers: Vernier Networks Colubris Networks Cisco Systems Bluesocket Fortress Technologies Trapeze Networks AirMagnet Proxim Symbol Technologies Funk Software Microsoft TamoSoft LucidLink Roving Planet SafeNet System Tools Van Dyke Software WildPackets AirWave Network Chemistry Aruba Networks Materials Covered Physical Security MAC Layer Security MAC Layer Security Network Layer Security WLAN Hardware and Software Solutions Application Security Authentication, Authorization, and Accounting (AAA) Systems Protocol Analyzers WLAN Intrusion

32 Classroom Training Onsite Training Remote Live Training 5 Day Course EC Council Ethical Hacking and Countermeasures 32 This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Students taking the Ethical Hacking and Countermeasures course must be 21 years or older. This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam This course prepares you for the EC-Council Certified Ethical Hacker exam CERT Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Enumeration System Hacking Trojans and Backdoors Viruses and Worms Sniffers Social Engineering Denial of Service Session Hijacking Hijacking Webservers Hacking Web Applications SQL Injection Hacking Wireless Networks Evading IDS, Firewalls, and Honeypots Buffer Overflow Cryptography Penetration Testing

33 Classroom Training Onsite Training Remote Live Training 5 Day Course EC Council Computer Hacking Forensic Investigator 33 Police and other law enforcement personnel, Defense and Military personnel, e-business Security professionals, Systems administrators, Legal professionals, Banking, Insurance and other professionals, Government agencies, and IT managers. This course will give participants the necessary skills to identify an intruder s footprints and to properly gather the necessary evidence to prosecute. Many of today s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the cyber-criminal. It is no longer a matter of will your organization be compromised (hacked)? but, rather, when? Today s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you. Modules 1: Computer Forensics in Today s World 2: Law and Computer Forensics 3: Computer Investigation Process 4: First Responder Procedure 5: CSIRT 6: Computer Forensic Lab 7: Understanding File Systems and Hard Disks 8: Understanding Digital Media Devices 9: Windows, Linux and Macintosh Boot Processes 10: Windows Forensics 11: Linux Forensics 12: Data Acquisition and Duplication 13: Computer Forensic Tools 14: Forensics Investigations Using Encase 15: Recovering Deleted Files and Deleted partitions 16: Image Files Forensics 17: Steganography 18: Application Password Crackers 19: Network Forensics and Investigating Logs 20: Investigating Network Traffic 21: Investigating Wireless Attacks 22: Investigating Web Attacks 23: Router Forensics 24: Investigating DOS Attacks 25: Investigating Internet Crimes 26: Tracking s and Investigating Crimes 27: Investigating Corporate Espionage 28: Investigating Trademark and Copyright Infringement 29: Investigating sexually harassment incidents 30: Investigating Child Pornography 31: PDA Forensics 32: ipod Forensics 33: Blackberry Forensics 34: Investigative Reports 35: Becoming an Expert Witness

34 Classroom Training Onsite Training Remote Live Training 4 Day Course F5 Networks BIG-IP LTM v11 34 This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system. Students should understand: TCP/IP addressing and routing including: The Address Resolution Protocol Direct and indirect routing TCP handshakes Command line configuration including: Commands and parameters Command line access (DOS or UNIX) Common elements of WAN and LAN components and their differences Fundamental programming concepts In addition, students should be proficient in: The Linux File System Pico editor or vi editor The tcpdump program Shell scripting TCL (Tool Command Language) Days 1 and 2 are aimed at teaching the students initial configuration and setup, while days 3 and 4 cover advanced configurations via the GUI and CLI. By the end of the course the students will be able to addresses various levels of network implementations as well as monitor and manage common tasks concerning traffic processed by a BIG-IP LTM system. Installation and Licensing Virtual Servers, Pools and Load Balancing Profiles irules Persistence Health Monitors SSL Termination and Certificate Management NATs and SNATs High Availability/Redundant System configurations tmsh (TM Shell) command line, SNMP and Logging BIG-IP Admin topics such as Clustered Multi-Processing (CMP), VLAN Management, and Administrative Domains *NEW in v11 - iapps

35 Classroom Training Onsite Training Remote Live Training 1 Day Course 8 Hour Session F5 Networks Changes in BIG-IP LTM v11 35 This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP LTM system. Students should have at least previously attended the BIG-IP LTM Essentials course (v9 or v10) with the LTM Advanced Topics course strongly recommended. Students should understand: Common Security and Network terminology TCP/IP Addressing and Routing and Internetworking concepts Security Authorization and Authentication concepts Common elements of and differences between WAN and LAN components. In addition, students should be proficient in: Basic PC operation and application skills, including operating a CD drive, keyboard, mouse and Windows OS Basic Web browser operation (Internet Explorer is used in class). By course completion, the student should have a firm grasp on new features in BIG-IP LTM v11. Additionally, assuming the student met the prerequisites above, they should be able to install, configure, monitor and administer a BIG-IP LTM v11 System. The major changes in LTM V11 covered in this course include: Setup utility changes for BIG-IP v11 vcmp feature in v11 Configuring iapps in BIG-IP v11 High Availability in v11 (Sync-Failover Device Groups) High Availability part 2 (Traffic Groups) Folders & Sync-Only Device Groups

36 Classroom Training Onsite Training 2 Day Course F5 Networks Troubleshooting BIG-IP LTM v10 36 This course is intended for system and network administrators responsible for troubleshooting and supporting BIG-IP LTM systems. Participants should understand: Successful completion of BIG-IP LTM or BIG-IP LTM Essentials Common network terminology TCP/IP addressing and routing Internetworking concepts Common elements of WAN and LAN environments In addition, participants should be proficient with: Basic PC operation and application skills, including operating a CD drive, keyboard, mouse and Windows OS, Basic Web browser operation (Internet Explorer is used in this class). This two-day course gives networking professionals hands-on knowledge of how to troubleshoot a BIG-IP LTM system using a number of troubleshooting techniques and troubleshooting and system tools. This course includes lectures, labs, and discussions. Configuration Project Problem Determination Process F5 Support BIG-IP Product Architecture Troubleshooting Networks and BIG-IP using OSI model Troubleshooting tools such as tcpdump Wireshark Fiddler Ssldump Logging and Notification Troubleshooting Projects By the end of this course, the student will be able to troubleshoot the BIG-IP LTM system using: Proven troubleshooting methodology Standard troubleshooting tools In addition, the student will be able to create and submit a support case.

37 Classroom Training Onsite Training Remote Live Training 2 Day Course F5 Networks BIG-IP GTM v11 37 This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP GTM System. Participants should understand: Common network terminology TCP/IP addressing and routing DNS methodology Internetworking concepts Common elements of WAN and LAN environments Data center server redundancy concepts In addition, students should be proficient with: Basic PC operation and application skills, including operating a CD drive, keyboard, mouse and Windows OS Basic web browser operation (Internet Explorer is used in class) By the end of this course, the student should be able to perform an initial configuration using the setup utility and build many common configurations using the Graphical User Interface (browser-based). In addition, the student should be able to monitor and manage common tasks concerning traffic processed through the BIG-IP GTM system. Installation and licensing DNS overview Accelerated DNS resolutions Load balancing for GTM LDNS probes and metrics Load balancing Monitors and probes Logs and notification Advanced Topics - DNSSEC, irules, synchronization, DNS integration, ihealth Configuration project

38 Classroom Training Onsite Training 3 Day Course F5 Networks Configuring BIG-IP with irules v10 38 This course is intended for system administrators, network administrators and application developers responsible for the configuration and administration of the BIG-IP LTM system. Prior to attending the Configuring BIG-IP with irules course the student must have attended the BIG-IP LTM Essentials course. The student can also benefit from several months experience configuring and designing with the BIG-IP LTM product before attending this course. Students should also be familiar with: Common network terminology TCP/IP addressing and routing Internetworking concepts Common elements of WAN and LAN environments Programming Basics (Tcl is a plus) This three-day course gives networking professionals an understanding of how to configure a BIG-IP system with irules. The course builds on the foundation of the BIG-IP Local Traffic Manager (LTM) Essentials course, demonstrating how to logically plan and write irules to help monitor and manage common tasks involved with processing traffic on the BIG-IP. Course Labs consist of writing, applying and evaluating the effect of irules on LTM traffic. This hands-on course includes lectures, labs, and discussions. Introduction DevCentral - The Resource for irules irule Elements Syntax and Troubleshooting irule Optimization irules and Security Expressions and Operators Variables and Loops Data Classes Persistence and Server Data Statistics and Final Project By the end of this course, the student will be able to logically plan and write irules to help monitor and manage common tasks involved with processing traffic through the BIG-IP LTM system.

39 Classroom Training Onsite Training 4 Day Course F5 Networks BIG-IP Application Security Manager v11 39 This class is intended for security and network administrators who will be responsible for the installation and day-to-day maintenance of the Application Security Manager. Participants should understand: Basic HTTP and HTML concepts Basic security concepts Common network terminology Web application terminology In addition, students should be proficient in: Basic PC operation and application skills, including operating a keyboard, mouse, Linux and Windows OS Basic Web browser operation (Internet Explorer and Mozilla Firefox are used in class) Basic HTTP site building and user-end knowledge XML knowledge will be helpful Upon completing this course, a student will be able to install and configure a security policy based on live traffic, wildcard entities and rapid deployment techniques as well as understand the related web traffic. The course is setup to enable learners to quickly adapt to new or preexisting ASM environments. Application Security Manager deployment types Configuration backup Web application security concepts HTTP and HTML concepts Common HTTP vulnerabilities HTTP and ASM classes Security policy building Reporting Logging profiles ASM user management Violations and traffic learning Parameter configuration and protection Security policy templates Wildcard entities Web services protection AJAX and JSON concepts Protocol security manager configuration

40 Classroom Training Onsite Training Remote Live Training 2½ Day Course Hour Session F5 Networks BIG-IP Edge Gateway - Access Policy Manager v11 40 This course is intended for system and network administrators responsible for installation, setup, configuration, and administration of the BIG-IP APM System. Students should understand: Common security and network terminology TCP/IP addressing, routing and internetworking concepts Security authorization and authentication concepts Common elements of WAN and LAN environments In addition, students should be proficient in: Basic PC operation and application skills, including MS Windows Basic web browser operation (Internet Explorer is used in class) By course completion, the student should be able to perform an initial configuration of the BIG-IP APM and Access Policies using the Visual Policy Editor Graphical User Interface. Additionally, the student should be able to monitor, administer, and perform basic troubleshooting tasks on traffic processed by the BIG-IP APM System. Installation and setup of the BIG-IP APM System Building Access Policies using the Visual Policy Editor Portal Access to both HTTP and HTTPS Web Applications Network Access using an SSL VPN tunnel Application access using an AppTunnel Authentication and authorization using Active Directory and RADIUS Building advanced policy checks using session variables and irules BIG-IP APM administration tools Lab projects

41 Classroom Training Onsite Training Remote Live Training ½ Day Course 4 Hour Session F5 Networks BIG-IP Edge Gateway WAN Optimization Module v10 41 This course is intended for installation engineers and others responsible for initial installation and configuration of the WAN Optimization Module. Participants should understand: Common Network terminology TCP/IP Addressing, Routing and Internetworking concepts The WAN Optimization Module is a half day course, designed for customers running the WAN Optimization Module on TMOS and is designed to help network professionals improve the performance of WAN connections between Data Centers or a Central and Remote Offices. Using lectures and hands-on exercises, participants gain real-time experience setting up and configuring the necessary portions of the Local Traffic Manager (LTM) system as well as typical WAN Optimization Module settings. In addition, discussion and labs focusing on the WAN Optimization Module include editing the Quick Start template and optimization policies to effect how the traffic is optimized as it is processed by the system. Installation, Licensing, and Provisioning Compression Basics Application Optimization Symmetric Adaptive Compression Symmetric Data Deduplication

42 Classroom Training Onsite Training Remote Live Training 1 Day Course 8 Hour Session F5 Networks F5 BIG-IP Edge Gateway WebAccelerator v10 42 This course is intended for installation engineers and others responsible for initial installation and configuration of the WebAccelerator Module. Participants should understand: Common Network terminology TCP/IP Addressing and Routing HTTP Standards Participants should be proficient with: Basic PC operation and application skills, including operating a CD drive, keyboard, mouse and Windows OS, Basic Web Browser operation (Internet Explorer is used in class). It is helpful if participants are familiar with: Pico editor or vi editor The tcpdump program Fiddler WebAccelerator is a one day course, designed for customers running the WebAccelerator Module on TMOS and is designed to help network professionals improve web site customer experience. The course focuses on typical HTTP processes and how the WebAccelerator Module can take advantage of those processes to decrease response time while ensuring data accuracy and integrity. Using lectures and hands-on exercises, participants gain real-time experience setting up and configuring the necessary portions of the Local Traffic Manager (LTM) system as well as typical WebAccelerator Module settings. From the LTM framework, these settings include pools, profiles and virtual servers. In addition, discussion and labs focusing on the WebAccelerator Module framework, include editing standard policies to effect how the traffic is manipulated as it is processed by the system. Participants will see how the changes improve the user experience through tools such as Fiddler. Installation, Licensing, and Provisioning HTTP Basics Application Profiles Acceleration Policies Symmetric Deployment

43 Classroom Training Onsite Training 2 Day Course FireMon FireMon Administrator 43 Technical persons tasked with the support or administration of Check Point solutions and/or the Juniper security product. Including: system & firewall administrators, network engineers, security staff, and installation or support consultants. Working knowledge of the internetworking concepts and an understanding of TCP/IP and network addressing. Working knowledge of managed devices (Check Point, Juniper, or Cisco). Managing FireMon for Check Point, Cisco and the Juniper IP Security Platform is a 2-day, instructor-led course which covers configuring and implementing FireMon for Check Point on Juniper IP Security Platforms. The course provides the information and experience necessary to deploy and manage FireMon configured for Check Point and Juniper management. Hands-on exercises enable students to effectively configure and deploy the application and demonstrate a thorough knowledge of the FireMon operations including revision control, auditing and performance monitoring. Identify the fundamental design considerations for FireMon Deploy the FireMon RCC and its components Compare different policies or instances of the same policy for purposes of revision control Set-up and run audits against rules, policies and traffic Monitor performance of the Juniper security device, run automated tasks such as report generation and policy installation

44 Classroom Training Onsite Training Remote Live Training 5 Day Course TRAINING SERVICES FishNet Security Training Services Certified Information Systems Security Professional (CISSP) 44 This CISSP review seminar helps you review the 10 domains of the information security practice. It also serves as a strong learning tool for mastering concepts and topics related to all aspects of information systems security. The CISSP 5-day seminar includes: Five, 8-hour sessions Post-Seminar Self-Assessment 100% up-to-date material An overview of the scope of the information security field The Review Seminar: Offers a high-level review of the main topics. Identifies areas students need to study. Provides an overview of the scope of the field.

45 Classroom Training Onsite Training Remote Live Training 1 Day Course TRAINING SERVICES FishNet Security Training Services DOD Information Assurance Certification and Accreditation Process (DIACAP) Fundamentals 45 This course is intended for System Owners, Program Managers and Information Assurance staff who need an overview of the DIACAP and the changes now occurring in the DoD Certification and Accreditation process. None This course provides an overview of the DIACAP process and the transition from Defense Information Technology Security Certification and Accreditation Process (DITSCAP) to DIACAP. Morning Introduction and Logistics Course Scope Information Security Concepts Certification and Accreditation Concepts and Standards Introduction to DIACAP DIACAP Life-Cycle Activities Afternoon Baseline IA Controls (DoDI ) DIACAP Documentation DITSCAP/DIACAP Transition DIACAP Resources and Tools (DIACAP Knowledge Service, emass) Course Summary Course Evaluation / Q&A

46 Classroom Training Onsite Training 3 Day Course TRAINING SERVICES FishNet Security Training Services DOD Information Assurance Certification and Accreditation Process (DIACAP) In Depth 46 This course is intended for System owners, administrators, developers, integrators, and Information Assurance staff who need a detailed working knowledge of the DIACAP process, the DoD baseline security controls, and the transition from DITSCAP to DIACAP. DIACAP Fundamentals Department of Defense Information Assurance Certification and Accreditation Process (DIACAP) In Depth. This course provides detailed information on the DIACAP C&A process, the DIACAP documentation package, DoDI IA controls, and DITSCAP transition. Day 1 - Morning Introduction and Logistics Course Scope Exercise - Build A System Quick Review of IA / C&A Introduction to DIACAP Day 1 - Afternoon What Constitutes a System? The DIACAP Process (DoDI ) Day 2 - Morning DIACAP Documentation Day 2 - Afternoon Introduction to DoDI Mission Assurance Category and Confidentiality Level Exercise - MAC & CL Baseline IA Controls (including implementation and validation) Exercise - IA Control Validation Day 3 - Morning DITSCAP/DIACAP Comparison DITSCAP/DIACAP Transition DIACAP Knowledge Service Introduction to emass Automated C&A Tools Security Testing Tools Exercise - Security Testing Tools Day 3 - Afternoon Exercise - DIACAP Application Course Summary Exercise - DIACAP Jeopardy Course Evaluation / Q&A

47 Classroom Training Onsite Training Remote Live Training 1 Day Course TRAINING SERVICES FishNet Security Training Services Federal Certification & Accreditation (C&A) Fundamentals This course is intended for System Owners, Program Managers and Information Security staff who want an overview of the National Institute of Standards & Technology - Federal Information Security Management Act (NIST-FISMA) process and the standardization now occurring in the federal Certification and Accreditation process. None 47 This course provides an overview of the NIST-FISMA process. A brief overview of Information Security Introduction to Certification and Accreditation NIST-FISMA background Applicable laws and regulations Roles and responsibilities The NIST process Introduction to Security Controls Security Control assessment C&A documentation Accreditation decisions FISMA reporting

48 Classroom Training Onsite Training Remote Live Training 3 Day Course TRAINING SERVICES FishNet Security Training Services Federal Certification & Accreditation (C&A) In Depth This course is intended for System owners, administrators, developers, integrators, and Information Assurance staff who need a detailed working knowledge of the National Institute of Standards & Technology - Federal Information Security Management Act (NIST-FISMA) process, and the NIST baseline security controls. Federal C&A In Depth 48 This course provides detailed information on the NIST-FISMA C&A process, the C&A documentation package, and NIST security controls. Day 1 - Morning Introduction and Logistics Course Scope Exercise - Build A System Quick review of IA concepts C&A Concepts and History Key policies: OMB A-130, FISMA Federal Information Processing Standards (FIPS) NIST Special Publications Day 2 Morning C&A Documentation Package System Security Plan (SSP) Risk Assessment Report Security Assessment (ST&E) Report Plan of Action and Milestones (POA&M) and FISMA reporting Transmittal and Decision Letters Other Documents Supporting Documentation Day 1 - Afternoon NIST C&A Process Overview Roles and Responsibilities C&A Prerequisites - Accreditation Boundary - System Categorization - Security Controls Selection (incl. Common Controls) - System Security Plan - Initial Risk Assessment Initiation Phase Activities Certification Phase Activities Accreditation Phase Activities Continuous Activities Monitoring Phase Day 2 Afternoon Introduction to Security Controls Security Controls (NIST SP ) Day 3 Morning Assessment Methods (NIST SP a) Security Testing Tools Exercise Security Control Implementation & Validation Exercise Security Testing Tools Resources CSRC website and others Automated C&A Tools Day 3 Afternoon Exercise C&A Application Course Summary Exercise C&A Jeopardy Course Evaluation / Q&A

49 Classroom Training Onsite Training Remote Live Training 5 Day Course TRAINING SERVICES FishNet Security Training Services Linux Security 49 Information security professionals seeking to learn how to use and secure Linux systems A basic understanding of computers and networking is all that is required. Linux is spreading rapidly throughout the corporate world. This course is designed to help you understand how to secure the Linux operating system and the various binaries that run on it. Through a series of hands-on exercises, you will learn what tools are available to you on any modern Linux distribution. Class will cover all Linux distributions with labs covering Ubuntu, Red Hat Enterprise / Fedora Core, Knoppix, Novell SuSe, and Debian. Introduction to Linux Overview of the GNU/ Linux operating system Differences between Linux distributions The Linux Standard Base (LSB) The Linux filesystem layout Shell Scripting Linux Security Basics SUDOers The 7 Most Common Problems Security Updates Password Security Filesystem Security Permissions Security Unneeded Services Physical Access Common Attacks Rootkits Packet Spoofing SYN Flooding Packet Storms Buffer Overflows Permissions Shell History Un-deleting files SUDOers Tripwire Network Services ifconfig Nmap SNORT Netfilter firewall Cryptography/Encryption Standards SSH SSH and Port Forwarding Gnu Privacy Guard (GPG) IPSEC with Openswan OpenVPN NFS Sendmail Telnet and FTP R* Services BIND Samba TCP Wrappers Additional Services Kernel Security SELinux Kernel Security Log Analysis and Forensics Log Analysis Recovering from an Intrusion Application Security Apache

50 Classroom Training Onsite Training Remote Live Training 1 Day Course TRAINING SERVICES FishNet Security Training Services PCI Security Awareness Package for End-Users The classroom presentations deal with information security issues at a high level and provide practical guidance relevant to all employees. Everyone from corporate executives with sensitive information on their PDAs to call center reps handling consumer credit card transactions will benefit from this course. None 50 This set of training courseware helps clients comply with the Payment Card Industry requirements for end-user security awareness training. PCI Primer Protecting Credit and Debit Card Data. 11 minute CBT. Introduces basic requirements of the PCI Data Security Standards. Helps employees understand their responsibilities for protecting credit and debit card data, and teaches simple, everyday guidelines for keeping this critical information safe. New Hire Training Module 1 of the Security Awareness series, Protecting Confidential Information, presents key security concepts and practical guidelines relevant to the average employee. (28 min.) Meets the PCI requirement for new hire security awareness training. Ongoing Awareness Training The five additional modules in the Security Awareness series cover specific security topics, including password security, malware defense, mobile computing and phishing. (Average length about 20 min.) Can be used to meet the PCI requirement for comprehensive, ongoing security awareness training.

51 Classroom Training Onsite Training Remote Live Training 1 Day Course TRAINING SERVICES FishNet Security Training Services Security Awareness for End-Users 51 The classroom presentations deal with information security issues at a high level and provide practical guidance relevant to all employees. Everyone from corporate executives with sensitive information on their PDA s to call center reps handling consumer credit card transactions will benefit from this course. None Compliance with security standards. Security Awareness training is mandatory for all employees with access to a corporate IT network under the following laws and standards: Payment Card Industry (PCI) Standards (Requirement 12.6) ISO Security Framework (ISO 27002, Sect ) Health Insurance Portability & Accountability Act (HIPAA) (45 CFR (a)(5)(i)) Graham-Leach-Bliley Act (GLBA) (16 CFR 314.4(b)(1)) The Sarbanes-Oxley Act (SOX) (requires implementation of ISO or another formal security framework). Our security awareness training solutions help organizations meet this requirement. Authoritative content. Course content, developed by FishNet Security professionals, is current and authoritative. Content is based on widely-accepted best practices for information security. The courseware: Communicates the mandate that all employees are responsible for protecting sensitive information both consumers Personally Identifiable Information (PII) and sensitive business information. Teaches end-users about security risks and gives them practical how-to s. Helps organizations comply with security and privacy regulations, show due diligence for protecting information assets, and prevent damaging security incidents. Engaging and effective. Creatively designed and media-rich, FishNet Security s courseware keeps the learner s interest and gets their attention.

52 Classroom Training Onsite Training Remote Live Training 1 Day Course TRAINING SERVICES FishNet Security Training Services Web Application Security Awareness for End-Users 52 The classroom presentations deal with information security issues at a high level and provide practical guidance relevant to all employees. Everyone from corporate executives with sensitive information on their PDA s to call center reps handling consumer credit card transactions will benefit from this course. None This series provides an overview of eight common types of attack. Each module explains how the attack works and gives examples of the attack. After highlighting the vulnerabilities exploited by the attack, it presents ways to reduce those vulnerabilities through proactive remediation steps. At the end of this series, you will understand how the following types of attack work, and how to protect against them: Forceful Browsing This module looks at exploiting hidden directories and state mechanics in a website. Data Modification in hidden fields This module will look at several types of data modification attacks including: URL search parameters, form fields, and cookies. Exploiting Information Leakage This module looks at how an attacker can use html comments and error messages to identify vulnerabilities in a site. Client-side Logic Subversion This module looks at the hacker exploitation that can take place through alterations to client side validation or data analysis. Command Injection This module looks at the effects of allowing a hacker to talk to a database, application, or operating system directly through a website. Session Hijacking This module looks at what happens when an attacker legitimizes an existing session s credentials, or access information handled during a valid session. Cross-site Scripting (XSS) This module looks at three types of scripting attacks that are perpetrated through tricking a user into executing a malicious script. Cross-site Request Forgery CSRF takes advantage of weak session management to trigger some type of sensitive function. Understanding these areas of vulnerability, and following the remediation steps this series presents, will help you make your commercial website more secure in the face of the unknown.

53 elearning 3 Hour Course 6-30 Minute Sessions TRAINING SERVICES FishNet Security Training Services elearning Security Awareness: Video Training 53 All organizations need to train their employees in Security Awareness. Without proper training, employees could divulge sensitive information vital to the ongoing success of their organization. None Compliance with security standards. Security Awareness training is mandatory for all employees with access to a corporate IT network under the following laws and standards: Payment Card Industry (PCI) Standards (Requirement 12.6) ISO Security Framework (ISO 27002, Sect ) Health Insurance Portability & Accountability Act (HIPAA) (45 CFR (a)(5)(i)) Graham-Leach-Bliley Act (GLBA) (16 CFR 314.4(b)(1)) The Sarbanes-Oxley Act (SOX) (requires implementation of ISO or another formal security framework). Our security awareness training solutions help organizations meet this requirement. Security Awareness Video Presentation Authoritative content. Course content, developed by FishNet Security professionals, is current and authoritative. Content is based on widely-accepted best practices for information security. The courseware: Communicates the mandate that all employees are responsible for protecting sensitive information both consumers Personally Identifiable Information (PII) and sensitive business information. Teaches end-users about security risks and gives them practical how-to s. Helps organizations comply with security and privacy regulations, show due diligence for protecting information assets, and prevent damaging security incidents. Engaging and effective. Creatively designed and media-rich, FishNet Security s courseware keeps the learner s interest and gets their attention. Modules 1: Protecting Confidential Information 2: Protecting Your Computer & Network 3: Mobile Computing 4: Physical Security 5: Social Engineering & Phishing 6: Information Security Risk Management Concepts

54 elearning 50 Minute Course Minute Sessions TRAINING SERVICES FishNet Security Training Services elearning Security Awareness: Criminal Crab 54 All organizations need to train their employees in Security Awareness. Without proper training, employees could divulge sensitive information vital to the ongoing success of their organization. None The course content, developed by FishNet Security professionals, is current and authoritative. Designed for everyone in an organization, this entertaining 50 minute course uses the loveable character Criminal Crab to teach end-user how to mitigate security risks in memorable and interactive courses. The courses: Teach end-users about security risks and gives them practical how-to s. Explore the many security risks employees face. Help organizations comply with security and privacy regulations. Use colorful images and animation. Come with interactive quizzes. Come with fun simple activities and games designed to increase knowledge retention. Language Availability: English Thai Latin American Spanish Latin American Portuguese Vietnamese Simplified Chinese Turkish Arabic Protecting Confidential Information Protecting Your Computer Mobile Security Physical Security Social Engineering

55 elearning 15 Minute Course TRAINING SERVICES FishNet Security Training Services elearning Security Awareness: Executive Review 55 This high level overview of Security Awareness is targeted at company executives and other high level employees. None Regular employees aren t the only ones who need to know and understand Security Awareness requirements. Executives, Vice Presidents, and other high level employees pressed for time can all benefit from this Security Awareness Executive Overview. This entertaining and authoritative 15 minute course covers the most important Security Awareness concepts as well as high level concepts such as calculating annual loss expectancy and designing appropriate security controls. Protecting Confidential Information Security Risks Social Engineering Mobile Device and Travel Safety Assessing and Managing Risk

56 elearning 2.2 Hour Course Minute Sessions TRAINING SERVICES FishNet Security Training Services elearning Developer Training: OWASP Top This course is intended for any web application developers who need to code, configure, design, or modify any website or application. This course also fulfills secure coding requirements. None Hackers use a variety of attacks that can result in fraud, theft, compromise of sensitive information, or data destruction. Developers need to be well-versed in the danger their applications face. This program teaches developers how to modify, create, and design safe and secure web-based applications using the OWASP Top 10. Introduction to OWASP Top 10 Injection Cross-Site Scripting Broken Authentication and Session Management Insecure Direct Object Reference Cross-Site Request Forgery Security Misconfiguration Insecure Cryptographic Storage Failure to Restrict URL Access Insufficient Transports Layer Unvalidated Redirects and Forwards

57 elearning 1 Hour 30 Minute Course Minute Sessions TRAINING SERVICES FishNet Security Training Services elearning Developer Training: Application Security 57 This course is intended for all web application developers who need to code, configure, design, or modify any website or application. None Hackers use a variety of attacks that can result in fraud, theft, compromise of sensitive information, or data destruction. Developers need to be well-versed in the danger their applications face. This program teaches developers how to modify, create, and design safe and secure web-based applications through eight in-depth and technical courses. Forceful Browsing Data Modification Exploiting Information Leakage Client-Side Logic Subversion Command Injection Session Hijacking Cross-Site Scripting Cross-Site Request Forgery

58 elearning 1 Hour 30 Minute Course Minute Sessions TRAINING SERVICES FishNet Security Training Services elearning Developer Training: Secure Coding 58 This course is intended for all web application developers who need to develop, configure, design, and modify any website or application that uses.net or JavaServer Faces. Knowledge of.net or JavaServer Faces The Secure Coding course examines coding best practices for both.net and Java. Students will learn from demonstrations, code reviews, and remediation steps. This program teaches developers how to modify, create, and design safe and secure web-based applications through eight in-depth and technical courses..net: Input Validation.Net: Error Handling.Net: Output Encoding.Net: SQL Injection Defense JSF: Input Validation JSF: Error Handling JSF: Output Encoding JSF: SQL Injection Defense

59 elearning 1 Hour 30 Minute Course Minute Sessions TRAINING SERVICES FishNet Security Training Services elearning Developer Training: Linux Security 59 The Linux Security course is targeted towards any employee who works with Linux systems. It teaches concepts that both Linux experts and beginners can learn from. None Developed with FishNet Security Senior Network Security Consultant Ralph Bonnell, Linux Security studies how to secure any Linux system. This program teaches common commands, recommends utilities and applications, demonstrates how to lock down applications, and even delves into specific firewall and network setups. The Linux Security program contains over an hour and a half worth of content and is composed of 12 courses. Introduction Security Basics File System Security Common Attacks Network Services Encryption Application Security Kernel Security Controlling Network Access Intrusion Detection Log Analysis Best Practices

60 elearning 1 Hour 10 Minute Course TRAINING SERVICES FishNet Security Training Services elearning PCI Training: Introduction to PCI 60 This course is intended for all employees who need a general introduction to PCI. None The Introduction to PCI course guides your organization through the complicated world of the Payment Card Industry. The program educates employees with a wide, yet focused, range of knowledge. The Introduction to PCI course is an engaging and interactive look of the Payment Card Industry and how it effects any organizations that works with cardholder data. Identity Theft and Credit Card Fraud Cardholder Data Protection Standards Cardholder Data Flow The Security Standards Council PCI-DSS Classification Levels Verifying Compliance Types of Cardholder Data Storing Cardholder Data Costs of a Data Breach Basic Security Guidelines

61 elearning 50 Minute Course Minute Sessions TRAINING SERVICES FishNet Security Training Services elearning PCI Training: PCI-DSS 61 This course is intended for employees who need to intimately know and understand the PCI-DSS. It is target towards any employ implementing any section of the PCI-DSS. None The PCI-DSS Course explains each of the DSS principles and requirements. It guides employees through all 6 principles and 12 requirements of the DSS and provides hints, tips, and best practices. Introduction to PCI-DSS Building and Maintaining a Secure Network Protecting Cardholder Data Maintaining a Vulnerability Management Program Implementing Strong Access Control measures Monitoring and Testing Your Network Maintaining an Information Security Policy

62 elearning 50 Minute Course Minute Sessions TRAINING SERVICES FishNet Security Training Services elearning PCI Training: PCI Scoping 62 This course is intended for all employees who need to understand and work with the PCI Scoping requirements. None The PCI Scoping program guides your organization through the complicated requirements developed by the Payment Card Industry. The PCI Scoping program explores cardholder data, scope, entity type, and more. The program helps organizations understand how they fit within PCI and covers roles and responsibilities of the many entity types. Defining and Storing Cardholder Data Discovering Your Scope Determining Your Entity Type Determining Your Level Choosing Your SAQ

63 elearning 10 Minute Course TRAINING SERVICES FishNet Security Training Services elearning HIPAA Training: Introduction to HIPAA 63 This course is intended for all employees who need a general introduction to HIPAA and the concepts that drive HIPAA. None This training program educates employees on both HIPAA and Security Awareness basics, best practices, hints, and tips. The 10 minute course teaches end-users about security risks and gives them practical how-to s. It explores HIPAA regulation and discusses Personally Identifiable Information (PII). HIPAA Overview History of HIPAA Key Terminology Key Standards Working with HIPAA

64 elearning 45 Minute Course Minute Sessions TRAINING SERVICES FishNet Security Training Services elearning Fundamentals of Corporate Communication 64 Every employee needs the ability to write in a manner that positions themselves, their department, and their organization in a positive and intelligent light. This course is intended for anyone who writes s, proposals, or deliverables in a corporate environment. None The Fundamentals program trains students in the basics of effective communication. It clearly and concisely explains how to write professionally, how to create and organize effective s, and how to create proper sentences that everyone can understand. The course helps employees effectively communicate through a number of forms of writing: from simple s and instant messages to written client deliverables and reports. Introduction Concise Writing Communication Sentence Structure

65 Classroom Training Onsite Training 1 Day Course Juniper Networks Introduction to JUNOS Operating System (IJOS) 65 This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. This one-day course provides students with the foundational knowledge required to work with the Junos operating system and to configure Junos devices. The course provides a brief overview of the Junos device families and discusses the key architectural components of the software. Key topics include user interface options with a heavy focus on the command-line interface (CLI), configuration tasks typically associated with the initial setup of devices, interface configuration basics with configuration examples, secondary system configuration, and the basics of operational monitoring and maintenance of Junos devices. This course is based on Junos OS Release 10.3R1.9. Chapter 1: Course Introduction Chapter 2: Junos Operating System Fundamentals The Junos OS Traffic Processing Platforms Running the Junos OS Chapter 3: User Interface Options User Interface Options The Junos CLI: CLI Basics The Junos CLI: Operational Mode The Junos CLI: Configuration Mode Lab 1: The Junos CLI Chapter 4: Initial Configuration Factory-Default Configuration Initial Configuration Interface Configuration Lab 2: Initial System Configuration Chapter 5: Secondary System Configuration User Configuration and Authentication System Logging and Tracing Network Time Protocol Archiving Configurations SNMP Lab 3: Secondary System Configuration Chapter 6: Operational Monitoring and Maintenance Monitoring Platform and Interface Operation Network Utilities Maintaining the Junos OS Password Recovery Lab 4: Operational Monitoring and Maintenance

66 Classroom Training Onsite Training 1 Day Course Juniper Networks JUNOS Routing Essentials (JRE) 66 This course benefits individuals responsible for configuring and monitoring devices running the Junos OS. Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. Students should also attend the Introduction to the Junos Operating System (IJOS) course prior to attending this class. This one-day course provides students with foundational routing knowledge and configuration examples and includes an overview of general routing concepts, routing policy and firewall filters, and class of service (CoS). This course is based on Junos operating system Release 10.3R1.9. Chapter 1: Course Introduction Chapter 2: Routing Fundamentals Routing Concepts: Overview of Routing Routing Concepts: The Routing Table Routing Concepts: Routing Instances Static Routing Dynamic Routing Lab 1: Routing Fundamentals Chapter 3: Routing Policy and Firewall Filters Routing Policy Overview Case Study: Routing Policy Lab 2: Routing Policy Firewall Filters Overview Case Study: Firewall Filters Unicast Reverse-Path-Forwarding Checks Lab 3: Firewall Filters Chapter 4: Class of Service CoS Overview Traffic Classification Traffic Queuing Traffic Scheduling Case Study: CoS Lab 4: Class of Service

67 Classroom Training Onsite Training 3 Day Course Juniper Networks JUNOS Security (JSEC) 67 This course benefits operators of SRX Series devices. These operators include network engineers, administrators, support personnel, and reseller support personnel. Students should have basic networking knowledge and an understanding of the Open Systems Interconnection (OSI) reference model and the TCP/IP protocol suite. Students should also either attend the Introduction to the Junos Operating System (IJOS) and Junos Routing Essentials (JRE) courses prior to attending this class, or have equivalent experience with the Junos OS. This three-day course covers configuration, operation, and implementation of SRX Series Services Gateways in a typical network environment. Key topics within this course include security technologies such as security zones, security policies, intrusion detection and prevention (IDP), Network Address Translation (NAT), and high availability clusters, as well as details pertaining to basic implementation, configuration, and management. This course is based on Junos operating system Release 10.3R1.9. Day 1 Chapter 1: Course Intro Chapter 2: Introduction to Junos security platforms Traditional Routing Traditional Security Breaking the Tradition The Junos OS Architecture Chapter 3: Zones The Definition of Zones Zone Configuration Monitoring Security Zones Lab 1: Configuring and Monitoring Zones Chapter 4: Security Policies Overview of Security Policy Policy Components Verifying Policy Operation Policy Scheduling and Rematching Policy Case Study Lab 2: Security Policies Day 2 Chapter 5: Firewall User Authentication Firewall User Authentication Overview Pass-Through Authentication Web Authentication Client Groups Using External Authentication Servers Verifying Firewall User Authentication Lab 3: Configuring Firewall Authentication Chapter 6: SCREEN Options Multilayer Network Protection Stages and Types of Attacks Using Junos SCREEN Options Reconnaissance Attack Handling Using Junos SCREEN Options Denial of Service Attack Handling Using Junos SCREEN Options Suspicious Packets Attack Handling Applying and Monitoring SCREEN Options Lab 4: Implementing SCREEN Options Chapter 7: Network Address Translation NAT Overview Source NAT Operation and Configuration Destination NAT Operation and Configuration Static NAT Operation and Configuration Proxy ARP Monitoring and Verifying NAT Operation Lab 5: Network Address Translation Day 3 Chapter 8: IPsec VPNs VPN Types Secure VPN Requirements IPsec Details Configuration of IPsec VPNs IPsec VPN Monitoring Lab 6: Implementing IPsec VPNs Chapter 9: Introduction to Intrusion Detection and Prevention Introduction to Junos IDP IDP Policy Components and Configuration Signature Database Case Study: Applying the Recommended IDP Policy Monitoring IDP Operation Lab 7: Implementing IDP Chapter 10: High Availability Clustering High Availability Overview Chassis Cluster Components Chassis Cluster Operation Chassis Cluster Configuration Chassis Cluster Monitoring Lab 8: Implementing Chassis Clusters

68 Classroom Training Onsite Training 3 Day Course Juniper Networks Configuring Juniper Networks Firewall / IP Sec VPN Products (CJFV) 68 This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks products. Basic networking knowledge and experience in: The Internet Networking concepts Terms including TCP/IP and bridging, switching, and routing This course is the first in the ScreenOS curriculum. It is a three-day, instructor-led course that focuses on configuration of the Juniper Networks firewall/vpn products in a variety of situations, including basic administrative access, routing, firewall policies and policy options, attack prevention features, address translation, and VPN implementations. The course combines both lecture and labs, with significant time allocated for hands-on experience. Students completing this course should be confident in their ability to configure Juniper Networks firewall/vpn products in a wide range of installations. Day 1 Chapter 1: Course Introduction Chapter 2: ScreenOS Concepts, Terminology, & Platforms Chapter 3: Initial Connectivity Lab 1: Initial Configuration Chapter 4: Device Management Lab 2: Device Administration Day 2 Chapter 5: Layer Three Operations Lab 3: Layer Three Operations Chapter 6: Basic Policy Configuration Lab 4: Basic Policy Configuration Chapter 7: Policy Options Lab 5: Policy Options Chapter 8: Address Translation Lab 6: Address Translation Tools Day 3 Chapter 9: Transparent Mode (optional) Lab 7: Transparent Mode Chapter 10: VPN Concepts Chapter 11: Policy-based VPNs Lab 8: Policy-based VPNs Chapter 12: Route-based VPNs Lab 9: Route-based VPNs APPENDIX A: Additional Features Hardware

69 Classroom Training Onsite Training 2 Day Course Juniper Networks Network and Security Manager Fundamentals (NSMF) 69 This course is intended for network engineers, network support personnel, reseller support personnel, and anyone else needing a working knowledge of Network and Security Manager. This course assumes that students have basic networking knowledge and experience in the following areas: JUNOS or ScreenOS Ethernet TCP/IP Routing This two-day course discusses the basic operations of Network and Security Manager. Key topics include server and domain administration, device configuration, template creation and management, policy creation and management, logging, and report generation. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting features of Network and Security Manager. Day 1 Chapter 1: Course Introduction Chapter 2: Network and Security Manager Concepts Chapter 3: Server Administration Chapter 4: Domains & Administrators Lab 1: Domains, Roles & Administrators Chapter 5: Adding Devices Lab 2: Adding Devices Chapter 6: Abstraction - Objects & Templates Lab 3: Abstraction - Objects & Templates Day 2 Chapter 7: Abstraction - Policies Lab 4: Creating Policies Chapter 8: Managing Devices Lab 5: Managing Devices Chapter 9: Logging & Reporting Lab 6: Logging & Reporting Chapter 10: Central Manager Chapter 11: Virtual Private Networks Lab 7: VPN s

70 Classroom Training Onsite Training 2 Day Course Juniper Networks Advanced Juniper Networks IPSec VPN Implementations (AJVI) 70 This course is intended for network engineers, network support personnel, & reseller support. Completion of the Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV) course or equivalent experience with ScreenOS software and general networking knowledge including Ethernet, TCP/IP, and routing concepts. This two-day, intermediate-level course focuses on the wide range of options available when configuring VPNs using Juniper Networks firewall/vpn products. Students attending the course will learn these various deployments through detailed lectures and hands-on lab exercises. Day 1 Chapter 1: Course Introduction Chapter 2: ScreenOS VPN Basics Review Lab 1: Configuration VPNs Chapter 3: VPN Variations Lab 2: VPN Variations Chapter 4: Hub & Spoke VPNs Lab 3: Hub & Spoke VPNs Chapter 5: Routing Over VPNs Lab 4: Routing Over VPNs Day 2 Chapter 6: Using Certificates Lab 5: Using Certificates Chapter 7: Redundant VPN Gateways (optional) Demo: Redundant VPN Gateways Chapter 8: Generic Routing Encapsulation (optional) Chapter 9: Dial-up IPSec VPNs Appendix A: NetScreen - Remote

71 Classroom Training Onsite Training 3 Day Course Juniper Networks Integrating Juniper Networks Firewalls and VPN s into High-Performance Networks (IFVH) 71 This course is intended for network engineers, network support personnel, and reseller support personnel. General networking knowledge, including Ethernet, TCP/IP, and routing concepts Completion of the Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV) course or equivalent product experience Completion of the Security Manager Fundamentals (SMF) course or equivalent product experience if using Security Manager This three-day course focuses on the ScreenOS features that are typically required in large-scale networks, including dynamic routing, virtual systems, traffic shaping, and high availability. Upon completing this course, students should be able to return to work and successfully install, configure, and verify that a ScreenOS-based device is interoperating in the network as desired. Through demonstrations and hands-on labs, students gain experience in configuring, testing, and troubleshooting these advanced features of ScreenOS software. Day 1 Chapter 1: Course Introduction Chapter 2: ScreenOS VPN Basics Review Lab 1: Configuration Review Chapter 3: IOSPF Lab 2 pt1: Configuring OSPF Lab 2 pt2: Configuring Redistribution Lab 2 pt3: Configuring Routing Tables Chapter 4: BGP Lab 3: Configuring BGP Day 2 Chapter 5: Advanced Static Routing Lab 4: Configuring Advanced Static Routing Chapter 6: Multicast Lab 5: Configuring Multicast Routing Chapter 7: Virtual Systems Lab 6 pt 1: Creating a VSYS Lab 6 pt 2: Inter - VSYS Routing Lab 6 pt 3: Route Export Lab 6 pt 4: Address Translation Day 3 Chapter 8: Redundancy Demo: NSRP Chapter 9: Traffic Management APPENDIX A: Virtual Systems Variations VSYS with IP Classification Transparent Mode VSYS

72 Classroom Training Onsite Training 1 Day Course Juniper Networks Attack Prevention with Juniper Networks Firewalls (APJF) 72 This course is intended for network engineers, support personnel, reseller support, and others responsible for implementing Juniper Networks products. Basic networking knowledge and experience in: The Internet Networking concepts Terms including TCP/IP and bridging, switching, and routing This course meets the business need of customers who are deploying the attack prevention features of ScreenOS software. The course focuses specifically on the attack-related features and assumes familiarity with ScreenOS software. Upon completing this course, you should be able to return to work and successfully configure and verify the desired attack prevention features. Chapter 1: Course Introduction Chapter 2: ScreenOS Basics Review Lab 1: Configuration Review Chapter 3: SCREEN Options Lab 2: Configuring SCREEN Options Chapter 4: Deep Inspection Overview Lab 3: Deep Inspection Chapter 5: Antivirus Lab 4: Antivirus Scanning Chapter 6: Web Filtering Lab 5: Web Filtering Chapter 7: Antispam Lab 6: Antispam Configuration

73 Classroom Training Onsite Training Remote Live Training 2 Day Course Juniper Networks Configuring Juniper Networks Secure Access (CJSA) 73 This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing SA products. Students have moderate background in internetworking basics, security concepts, network administration, and application support. Course discusses the configuration of Secure Access (SA) products in a typical network environment. Key topics include SSL access technologies, basic implementation, and configuration and management options. Through demonstrations and hands on labs, students will gain experience in configuring, testing, and troubleshooting basic facets of the SA products. Introduction to the SA platform Introduction to Secure Sockets Layer (SSL) protocol & public key infrastructure (PKI) Typical deployment scenarios SA terminology Roles Role restrictions Realms Resource policies Sign-in policies Authentication servers Local Lightweight Directory Access Protocol (LDAP) RADIUS (including two-factor) NT Network Information Service (NIS) Authentication policies Host Checker Cache Cleaner Client/server support J-SAM W-SAM Network Connect Day 1 Chapter 1: Course Introduction Chapter 2: Products & Features Chapter 3: Technology & Terminology Chapter 4: Initial Configuration Lab 1: Initial Configuration Chapter 5: User Roles Lab 2: User Roles Chapter 6: Logging & Troubleshooting Lab 3: Logging & Troubleshooting Day 2 Chapter 7: Resource Policies Lab 4: Resources Chapter 8: Servers for Authentication Lab 5: Authentication Servers & Realms Chapter 9: Client & Server Applications Lab 6: Applications Chapter 10: Endpoint Security Lab 7: Endpoint Security Troubleshooting

74 Classroom Training Onsite Training Remote Live Training 2 Day Course Juniper Networks Advanced Juniper Networks Secure Access (AJSA) 74 This course is intended for network engineers, support personnel, reseller support, and anyone responsible for implementing SA products. This course assumes that students have successfully attended the Configuring Juniper Networks Secure Access (CJSA) course or have equivalent experience with the Juniper Networks NetScreen Secure Access products. Specifically, students need to be familiar with the configuration of Roles, Realms, Resource Policies, and Authentication Servers. Course discusses the advanced configuration of Secure Access (SA) products. Key topics include PKI support, additional authentication/authorization servers, complex policies, customization, and high availability. Through demonstrations and hands on labs, students will gain experience in configuring, testing, and troubleshooting advanced features of the SA products. Advanced access management Public key infrastructure (PKI) support Certificate revocation lists (CRL) Virtual hosting Single sign-on (SSO) Advanced authentication Certificate Anonymous Netegrity SAML Advanced policies Rewriting policies Authentication policies Role mapping Resource policies Password management Administrative delegation Custom user interface (UI) Clustering Instant Virtual System (IVS) Secure meeting Day 1 Chapter 1: Course Introduction Chapter 2: Reviews Lab 1: Configuration Review Chapter 3: Authentication Options Lab 2: Authentication Options Chapter 4: Certificates Lab 3: Using Certificates Chapter 5: Complex Policies Lab 4: Complex Policies Chapter 6: Client and Server Lab 5: Client/Server Day 2 Chapter 7: Administration Lab 6: Administration Chapter 8: Juniper Endpoint Defense Initiative Lab 7: Host Checker Chapter 9: Instant Virtual Systems Lab 8: Virtual Systems Chapter 10: Clustering Lab 9: Active/Passive Configuration Chapter 11: Secure Meeting Lab 10: Secure Meeting

75 Classroom Training Onsite Training Remote Live Training 3 Day Course Juniper Networks Implementing Intrusion Detection & Prevention Products (IIDP) 75 Network engineers, support personnel, reseller support, and others responsible for implementing Juniper IDP products. This course assumes that students have basic networking knowledge and experience in the following areas: Internetworking basics, TCP/IP Operations, Network security concepts, Network administration, Application support, also assumes that students have attended the Security Manager Fundamentals (2 day course). Course discusses the configuration of Juniper Intrusion Detection and Prevention (IDP) sensors in a typical network environment. Key topics include: sensor configuration, creating and fine-tuning security policies, managing attack objects, creating custom signatures, and troubleshooting. This course is based upon IDP software version 4.0, and Security Manager Through demonstrations and hands on labs, students will gain experience in configuring, testing, and troubleshooting the IDP sensor. Chapter 1: Course Introduction Chapter 2: Intrusion Detection Concepts Chapter 3: Initial Configuration of IDP Sensor Chapter 4: Policy Basics Chapter 5: Fine-tuning Security Policies Chapter 6: Configuring Other Rulebases Chapter 7: Profiler Chapter 8: Sensor Operation and Command-line Utilities Chapter 9: Managing Attack Objects Chapter 10: Creating Custom Signatures Chapter 11: Maintenance & Troubleshooting Chapter 12: High-Availability

76 Classroom Training Onsite Training 2 Day Course Juniper Networks Configuring Unified Access Control (CUAC) 76 The intended audience for this course includes network engineers, support personnel, reseller support, and anyone responsible for implementing the Unified Access Control products. Completion of Configuring Juniper Networks Firewall/IPSec VPN Products (CJFV) or equivalent experience with ScreenOS firewalls is required. The course also assumes that students understand internetworking basics, basic security concepts, network administration, application support, and basic remote access concepts. This two-day course discusses the configuration of the Unified Access Control solution offered by Juniper Networks. Students will work with the solution elements the Infranet Controller, the Infranet Enforcer, and the Infranet Agent to configure secured access to network resources. Key topics include Unified Access Control deployment, basic implementation, and element configuration. Students will have the opportunity to apply their knowledge in several hands-on labs. Day 1 Chapter 1: Course Introduction Chapter 2: UAC Solution Chapter 3: Initial Configuration Lab 1: Initial Configuration Chapter 4: Access Control Lab 2: Access Control Day 2 Chapter 5: Access Control Using 802.1X Lab 3: Policy Configuration Using 802.1X Chapter 6: Management & Troubleshooting Lab 4: Logging & Troubleshooting Chapter 7: Authentication Options Lab 5: Authentication Options Chapter 8: Endpoint Defense Lab 6: Endpoint Defense

77 Classroom Training Onsite Training Remote Live Training 5 Day Course McAfee Sidewinder: Firewall Enterprise System Administration The Firewall Enterprise System Administration course is a fast-paced hands-on introduction to Firewall Enterprise. It supplies a broad familiarity with day-to-day administration skills and the knowledge required to use those skills effectively. 77 Firewall System Overview Appliance Platform Options SecureOS Type Enforcement Features and Components Overview Installation and Integration - Planning and Practice Auditing and Reporting DNS Configuration & Customization Policy Management Proxies Servers IP Filters Application Defenses Authentication Configuration On-board Authentication System Management Patches Backup/Restore Admin Accounts Burbs HTTP Configuration & Customization Includes Anti-Virus TrustedSource Passport Authentication Includes use of off-board LDAP server SSL Decryption IPSec VPN s Signature-Based IPS Reliability and Scalability High Availability Load Sharing High Availability One-to-Many Cluster Function-Specific Diagnostics & Debug Tools

78 Classroom Training Onsite Training Remote Live Training 3 Day Course Palo Alto Networks Essentials 1: Firewall Installation, Configuration and Management 78 The class is designed for Security Engineers, Network Engineers, and Support personnel. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students should also be familiar with basic port-based security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus. Successful completion of this three-day, instructor led course will enable the student to install, configure, and manage the entire line of Palo Alto Networks Next-Generation firewalls. Students attending this introductory-level class will gain an in-depth knowledge of how to install, configure, and manage their firewall, as well as configuration steps for the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operation System (PAN-OS). Course level: Introductory Course duration: 3 Days Course format: Combines lecture with hands-on labs Platform support: PA-200 through PA-5000 series

79 Classroom Training Onsite Training Remote Live Training 3 Day Course Palo Alto Networks Essentials 2: Extended Firewall Management The class is designed for Security Engineers, Network Engineers, and Support personnel. 79 Completion of Firewall Installation, Configuration, and Management (201) or equivalent experience is highly recommended Students must have a basic familiarity with networking concepts including routing, switching, IP addressing, and basic port-based security concepts. Extended Firewall Management is the next-level follow-on course to Palo Alto Networks Installation, Configuration, and Management (PAN-EDU-201). Extended Firewall Management expands on 201 course topics, while introducing many new features and functions of Palo Alto Networks Next-Generation firewalls. Successful completion of this three-day, instructor-led course will enhance the student s understanding of how to install, configure, manage, and perform basic troubleshooting on the entire line of Palo Alto Networks Next-Generation firewalls. Additionally, students will be instructed on the basics of implementing and managing GlobalProtect, Panorama, and Active/Active High Availability. Students will gain an in-depth knowledge of how to optimize their visibility and control over applications, users, and content Course level: Introductory Course duration: 3 Days Course format: Combines lecture with hands-on labs Platform support: PA-200 through PA-5000 series

80 Classroom Training Onsite Training Remote Live Training 5 Day Course Palo Alto Networks Essentials Bundle: Firewall Installation, Configuration and Management + Extended Firewall Management 80 The class is designed for Security Engineers, Network Engineers, and Support personnel. Students must have a basic familiarity with networking concepts including routing, switching, and IP addressing. Students should also be familiar with basic port-based security concepts. Experience with other security technologies (IPS, proxy, and content filtering) is a plus. This is a five-day boot camp style course efficiently combines 201 (Firewall Installation, Configuration, & Management) and 205 courses (Extended Firewall Management). This course is packed with useful information that will allow you to become an expert on the many new features of Palo Alto s Next-Generation firewalls. Students attending this introductory-level class will gain an in-depth knowledge of how to install, configure, and manage their firewall, as well as configuration steps for the security, networking, threat prevention, logging, and reporting features of the Palo Alto Networks Operation System (PAN-OS). Additionally, students will be taught how to implement and manage GlobalProtect, Panorama, and Active/Active High Availability. An in-depth knowledge of how to optimize visibility and control over applications, users, and content will be achieved. Course level: Introductory Course duration: 5 Days Course format: Combines lecture with hands-on labs Platform support: PA-200 through PA-5000 series

81 Classroom Training Onsite Training Remote Live Training 3 Day Course Q1 Labs Introduction to QRadar 81 The class is designed for Security/Network Administrators who have at least working knowledge of networking and network security and are using QRadar to manage their network and security programs. None This course provides an overview and understanding of the QRadar technology. After successfully completing this course, you should be able to: Understand QRadar s technology and the various problems it solves Understand how to configure QRadar to fit your requirements Understand how to configure QRadar to meet individual requirements Understand how to monitor specific information quickly within the QRadar interface Navigating the QRadar interface Understanding and using the Events interface Understanding and using the Flows interface Using Advanced event and flow filters Assets and Vulnerability Assessment Network Surveillance Understanding Sentries Understanding and Using the Offenses interface Working Offenses Working with QRadar s Rules Tuning QRadar QRadar Reports

82 Classroom Training Onsite Training 3 Day Course Riverbed Steelhead Appliance Deployment & Management 82 Steelhead Appliance Deployment & Management is targeted specifically for Riverbed resellers/ partners and customers involved in the design, deployment, or administration/technical support of Steelhead appliances. Certification as a CCNP/CCIP or the equivalent internetworking knowledge extremely helpful (routing protocols, TCP/IP, network design, and troubleshooting) Participants are required to bring along their own laptops AND, If using our hardware, a serial cable is required or a USB-to-serial adaptor for the class labs (please view the confirmation sent to you regarding version of course being delivered). Steelhead Appliance Deployment & Management is a four-day, lab-intensive course delivered by Riverbed technical experts. This task-oriented course imparts the knowledge and skills needed to deploy and administer Riverbed Steelhead appliances in complex network environments. Course Objectives: Upon completion of the course, you ll be able to: List the features of the Steelhead appliances Navigate within the Management Console (GUI) and the Command Line Interface (CLI) Configure the Steelhead appliances in various network deployment scenarios Size the Steelhead appliances for a given network Perform network integration Perform basic troubleshooting and identify any potential problems that might occur when deploying the product Course Overview Riverbed Technology Overview Riverbed Product Overview Steelhead Connection Interception Riverbed Deployment Options Transaction Prediction SDR-only Optimizations System Management & Reporting Top Deployment Problems & Troubleshooting Riverbed Services Platform (RSP) RiOS HighSpeed TCP (HS-TCP) Optimization Data Replication & Performance Tuning Deployment Planning Agentless CIFS Prepopulation Quality of Service (QoS) Course Summary Appendix: Proxy File Services (PFS)

83 Classroom Training Onsite Training Remote Live Training 5 Day Course Websense Web Security Gateway Anywhere (WSGA) 83 Administrators, developers, web developers, and managers who are responsible for configuring and tailoring Websense WSGA. During this five-day training course, you will learn how to configure, administer and support Websense Web Security Gateway Anywhere (WSGA). Through instruction, demonstrations and hands-on lab practice exercises, you will learn core skills in administering WSGA such as customizing filters, designing policies, and understanding scanning features and SSL configuration. You will also learn the requirements and recommendations to successfully deploy WSGA in a variety of network environments. You will develop the skills required to successfully manage an existing deployment and will also be able to successfully deploy WSGA including Web DLP and TruHybrid functionality. Understand the WSGA Architecture Configure filters and policies Configure advanced scanning features Configure SSL content inspection and category bypass Understand reporting and real-time monitoring Configure explicit and transparent proxy Configure multiple methods of identification and authentication Understand and deploy the WSGA TruHybrid solution

84 Classroom Training Onsite Training Remote Live Training 2 Day Course Websense Security Gateway Anywhere (ESGA) 84 Administrators, developers and managers who are responsible for configuring and tailoring Websense ESGA. During this two-day training course, you will learn how to install, configure, administer and support Websense Security Gateway Anywhere (ESGA). Through instruction, demonstrations and hands-on lab practice exercises, you will learn the requirements and recommendations to successfully deploy ESGA in a variety of network environments. You will develop the skills required to successfully manage an existing deployment and will also be able to successfully deploy ESGA. Understand the ESGA Architecture Install ESGA Configure initial settings Understand Personal Manager Configure encryption Manage archived Understand clustering and encryption concepts as they relate to ESGA

85 Classroom Training Onsite Training Remote Live Training 3 Day Course Websense Data Security Suite (DSS) 85 Administrators, developers and managers who are responsible for configuring and tailoring Websense DSS. During this three day training course, you will learn how to install, configure, administer, and support Websense Data Security Suite. Through instruction, demonstrations, and hands-on lab practice exercises, you will learn the requirements and recommendations to successfully deploy Data Security Suite in a variety of network environments. You will develop expertise in creating data security policies, fingerprinting structured and unstructured content, data discovery, endpoint configuration and deployment, incident management, reporting, and system architecture. Understand the fundamentals of DLP technology Use Policy Wizard and PreciseID Fingerprinting Understand Data Discovery Review Incidents and Reports Configure initial setting Configure DSS Protector Create different policy levels Understand the integration between DSS and Web Security Gateway Anywhere (WSGA) Test DSS policies on WSGA Perform a backup of DSS management server Understand best practices for configuration and implementation

86 TRAINING LOCATIONS Atlanta Haynes Bridge Rd. Ste. 450 Alpharetta, GA p: Tampa 500 N. Westshore Ste. 950 Tampa, FL p: Chicago 22 W. Washington Ste Chicago, IL p: Dallas Spectrum Dr. Ste. 345 Addison, TX p: Kansas City 1709 Walnut St. Kansas City, MO p: Las Vegas 3960 Howard Hughes Pkwy. Suite 500 Las Vegas, NV p: Twin Cities 332 Minnesota St. Ste. West 701 St. Paul, MN p: Washington D.C. Metro Area Sunrise Valley Dr. Ste. 130 Herndon, VA p: New York City 5 Penn Plaza Center 23rd Floor New York, NY p: San Francisco Bay Area 111 Lindbergh Ave. Ste. F Livermore, CA p:

87 Disclaimer Although every effort has been made to assure the accuracy of the information in this catalog, please note that course information, technical information, laws, and policies change and these changes may alter the information contained in this publication. FishNet Security reserves the right to change any information contained in the Training. The information in this catalog is intended for informational purposes only and does not constitute a legal contract between FishNet Security, its training group and any person or entity. Classroom Training courses subject to reschedule or cancellation; do not book non-refundable travel without first verifying that your course will run. Corporate Headquarters 6130 Sprint Parkway, Suite 400, Overland Park, KS

INFORMATION SECURITY TRAINING CATALOG (2015)

INFORMATION SECURITY TRAINING CATALOG (2015) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Build Your Own Security Lab

Build Your Own Security Lab Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology

More information

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning

More information

2016 TÜBİTAK BİLGEM Cyber Security Institute

2016 TÜBİTAK BİLGEM Cyber Security Institute 2016 Revision 5.0 2016 TÜBİTAK BİLGEM Cyber Security Institute 1 ... 3 1. Information Security Awareness for End Users... 4 2. Information Security Awareness for Managers... 5 3. Social Engineering: Attack

More information

INFORMATION SECURITY TRAINING CATALOG (2016)

INFORMATION SECURITY TRAINING CATALOG (2016) INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2016) Revision 4.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,

More information

How To Protect A Web Application From Attack From A Trusted Environment

How To Protect A Web Application From Attack From A Trusted Environment Standard: Version: Date: Requirement: Author: PCI Data Security Standard (PCI DSS) 1.2 October 2008 6.6 PCI Security Standards Council Information Supplement: Application Reviews and Web Application Firewalls

More information

Nexum Training Course Catalog

Nexum Training Course Catalog Nexum Training Course Catalog Nexum Training Course Catalog Table of Contents JUNIPER Juniper SRX Bootcamp..................................................... 4 Juniper JNCIS - ENT Bootcamp..............................................

More information

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified

Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Standard: Data Security Standard (DSS) Requirement: 6.6 Date: February 2008 Information Supplement: Requirement 6.6 Code Reviews and Application Firewalls Clarified Release date: 2008-04-15 General PCI

More information

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats

WHITE PAPER. FortiWeb and the OWASP Top 10 Mitigating the most dangerous application security threats WHITE PAPER FortiWeb and the OWASP Top 10 PAGE 2 Introduction The Open Web Application Security project (OWASP) Top Ten provides a powerful awareness document for web application security. The OWASP Top

More information

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details

ANNEXURE-1 TO THE TENDER ENQUIRY NO.: DPS/AMPU/MIC/1896. Network Security Software Nessus- Technical Details Sub: Supply, Installation, setup and testing of Tenable Network Security Nessus vulnerability scanner professional version 6 or latest for scanning the LAN, VLAN, VPN and IPs with 3 years License/Subscription

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

The following chart provides the breakdown of exam as to the weight of each section of the exam.

The following chart provides the breakdown of exam as to the weight of each section of the exam. Introduction The CWSP-205 exam, covering the 2015 objectives, will certify that the successful candidate understands the security weaknesses inherent in WLANs, the solutions available to address those

More information

The Trivial Cisco IP Phones Compromise

The Trivial Cisco IP Phones Compromise Security analysis of the implications of deploying Cisco Systems SIP-based IP Phones model 7960 Ofir Arkin Founder The Sys-Security Group [email protected] http://www.sys-security.com September 2002

More information

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001

ETHICAL HACKING 010101010101APPLICATIO 00100101010WIRELESS110 00NETWORK1100011000 101001010101011APPLICATION0 1100011010MOBILE0001010 10101MOBILE0001 001011 1100010110 0010110001 010110001 0110001011000 011000101100 010101010101APPLICATIO 0 010WIRELESS110001 10100MOBILE00010100111010 0010NETW110001100001 10101APPLICATION00010 00100101010WIRELESS110

More information

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY

More information

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006

Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,

More information

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition

Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Advanced Administration for Citrix NetScaler 9.0 Platinum Edition Course Length: 5 Days Course Code: CNS-300 Course Description This course provides the foundation to manage, configure and monitor advanced

More information

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

2. From a control perspective, the PRIMARY objective of classifying information assets is to: MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected

More information

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES. www.kaspersky.com KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES www.kaspersky.com EXPERT SERVICES Expert Services from Kaspersky Lab are exactly that the services of our in-house experts, many of them global

More information

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES

FINAL DoIT 11.03.2015 - v.4 PAYMENT CARD INDUSTRY DATA SECURITY STANDARDS APPLICATION DEVELOPMENT AND MAINTENANCE PROCEDURES Purpose: The Department of Information Technology (DoIT) is committed to developing secure applications. DoIT s System Development Methodology (SDM) and Application Development requirements ensure that

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical

More information

Basic & Advanced Administration for Citrix NetScaler 9.2

Basic & Advanced Administration for Citrix NetScaler 9.2 Basic & Advanced Administration for Citrix NetScaler 9.2 Day One Introducing and deploying Citrix NetScaler Key - Brief Introduction to the NetScaler system Planning a NetScaler deployment Deployment scenarios

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

Security + Certification (ITSY 1076) Syllabus

Security + Certification (ITSY 1076) Syllabus Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and

More information

Sitefinity Security and Best Practices

Sitefinity Security and Best Practices Sitefinity Security and Best Practices Table of Contents Overview The Ten Most Critical Web Application Security Risks Injection Cross-Site-Scripting (XSS) Broken Authentication and Session Management

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE

Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the

More information

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9 NETASQ & PCI DSS Is NETASQ compatible with PCI DSS? We have often been asked this question. Unfortunately, even the best firewall is but an element in the process of PCI DSS certification. This document

More information

Information Security. Training

Information Security. Training Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin

More information

Design and Implementation Guide. Apple iphone Compatibility

Design and Implementation Guide. Apple iphone Compatibility Design and Implementation Guide Apple iphone Compatibility Introduction Security in wireless LANs has long been a concern for network administrators. While securing laptop devices is well understood, new

More information

Achieving PCI-Compliance through Cyberoam

Achieving PCI-Compliance through Cyberoam White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit

More information

Understanding Security Testing

Understanding Security Testing Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many

More information

ICANWK406A Install, configure and test network security

ICANWK406A Install, configure and test network security ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

A Decision Maker s Guide to Securing an IT Infrastructure

A Decision Maker s Guide to Securing an IT Infrastructure A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose

More information

McAfee Certified Assessment Specialist Network

McAfee Certified Assessment Specialist Network McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample

More information

Achieving PCI Compliance Using F5 Products

Achieving PCI Compliance Using F5 Products Achieving PCI Compliance Using F5 Products Overview In April 2000, Visa launched its Cardholder Information Security Program (CISP) -- a set of mandates designed to protect its cardholders from identity

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

The Top Web Application Attacks: Are you vulnerable?

The Top Web Application Attacks: Are you vulnerable? QM07 The Top Web Application Attacks: Are you vulnerable? John Burroughs, CISSP Sr Security Architect, Watchfire Solutions [email protected] Agenda Current State of Web Application Security Understanding

More information

The Key to Secure Online Financial Transactions

The Key to Secure Online Financial Transactions Transaction Security The Key to Secure Online Financial Transactions Transferring money, shopping, or paying debts online is no longer a novelty. These days, it s just one of many daily occurrences on

More information

Guidelines for Web applications protection with dedicated Web Application Firewall

Guidelines for Web applications protection with dedicated Web Application Firewall Guidelines for Web applications protection with dedicated Web Application Firewall Prepared by: dr inŝ. Mariusz Stawowski, CISSP Bartosz Kryński, Imperva Certified Security Engineer INTRODUCTION Security

More information

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100

Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 [email protected] 866-605- 6328 www.redhawksecurity.

Redhawk Network Security, LLC 62958 Layton Ave., Suite One, Bend, OR 97701 sales@redhawksecurity.com 866-605- 6328 www.redhawksecurity. Planning Guide for Penetration Testing John Pelley, CISSP, ISSAP, MBCI Long seen as a Payment Card Industry (PCI) best practice, penetration testing has become a requirement for PCI 3.1 effective July

More information

13 Courses Quick Guide

13 Courses Quick Guide 13 Courses Quick Guide Microsoft Network Infrastructure 2008 Microsoft Certified Solution Associate (MCSA 2012) MCSE 2012 (Private Cloud) MCSE Server infrastructure 2012 Administering & Configuring Microsoft

More information

Associate in Science Degree in Computer Network Systems Engineering

Associate in Science Degree in Computer Network Systems Engineering Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45

More information

information security and its Describe what drives the need for information security.

information security and its Describe what drives the need for information security. Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.

More information

Criteria for web application security check. Version 2015.1

Criteria for web application security check. Version 2015.1 Criteria for web application security check Version 2015.1 i Content Introduction... iii ISC- P- 001 ISC- P- 001.1 ISC- P- 001.2 ISC- P- 001.3 ISC- P- 001.4 ISC- P- 001.5 ISC- P- 001.6 ISC- P- 001.7 ISC-

More information

Web Application Security 101

Web Application Security 101 dotdefender Web Application Security Web Application Security 101 1 Web Application Security 101 As the Internet has evolved over the years, it has become an integral part of virtually every aspect in

More information

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline

Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary

More information

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.

More information

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked. This sample report is published with prior consent of our client in view of the fact that the current release of this web application is three major releases ahead in its life cycle. Issues pointed out

More information

IT Networking and Security

IT Networking and Security elearning Course Outlines IT Networking and Security powered by Calibrate elearning Course Outline CompTIA A+ 801: Fundamentals of Computer Hardware/Software www.medallionlearning.com Fundamentals of Computer

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011

ACADEMIC PROGRAM REVIEW PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE. Report Amended October 2011 ACADEMIC PROGRAM REVIEW of PC AGE 145 TALMADGE ROAD EDISON, NJ 08817 REVIEW DATE May 12-13, 2011 Report Amended October 2011 Table of Contents PC AGE Organizational Profile... 3 Academic Program Review

More information

74% 96 Action Items. Compliance

74% 96 Action Items. Compliance Compliance Report PCI DSS 2.0 Generated by Check Point Compliance Blade, on July 02, 2013 11:12 AM 1 74% Compliance 96 Action Items Upcoming 0 items About PCI DSS 2.0 PCI-DSS is a legal obligation mandated

More information

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Adobe Systems Incorporated

Adobe Systems Incorporated Adobe Connect 9.2 Page 1 of 8 Adobe Systems Incorporated Adobe Connect 9.2 Hosted Solution June 20 th 2014 Adobe Connect 9.2 Page 2 of 8 Table of Contents Engagement Overview... 3 About Connect 9.2...

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

elearning for Secure Application Development

elearning for Secure Application Development elearning for Secure Application Development Curriculum Application Security Awareness Series 1-2 Secure Software Development Series 2-8 Secure Architectures and Threat Modeling Series 9 Application Security

More information

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected]

Web Application Security. Radovan Gibala Senior Field Systems Engineer F5 Networks r.gibala@f5.com Web Application Security Radovan Gibala Senior Field Systems Engineer F5 Networks [email protected] Security s Gaping Hole 64% of the 10 million security incidents tracked targeted port 80. Information Week

More information

Protecting Your Organisation from Targeted Cyber Intrusion

Protecting Your Organisation from Targeted Cyber Intrusion Protecting Your Organisation from Targeted Cyber Intrusion How the 35 mitigations against targeted cyber intrusion published by Defence Signals Directorate can be implemented on the Microsoft technology

More information

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies

Cyber Security in Taiwan's Government Institutions: From APT To. Investigation Policies Cyber Security in Taiwan's Government Institutions: From APT To Investigation Policies Ching-Yu, Hung Investigation Bureau, Ministry of Justice, Taiwan, R.O.C. Abstract In this article, we introduce some

More information

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE

FINAL DoIT 04.01.2013- v.8 APPLICATION SECURITY PROCEDURE Purpose: This procedure identifies what is required to ensure the development of a secure application. Procedure: The five basic areas covered by this document include: Standards for Privacy and Security

More information

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected]

PCI Compliance - A Realistic Approach. Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM hjoshi@cbiz.com PCI Compliance - A Realistic Approach Harshul Joshi, CISM, CISA, CISSP Director, Information Technology CBIZ MHM [email protected] What What is PCI A global forum launched in September 2006 for ongoing enhancement

More information

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

IBM. Vulnerability scanning and best practices

IBM. Vulnerability scanning and best practices IBM Vulnerability scanning and best practices ii Vulnerability scanning and best practices Contents Vulnerability scanning strategy and best practices.............. 1 Scan types............... 2 Scan duration

More information

PCI Requirements Coverage Summary Table

PCI Requirements Coverage Summary Table StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2

More information

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

MOC 6435A Designing a Windows Server 2008 Network Infrastructure MOC 6435A Designing a Windows Server 2008 Network Infrastructure Course Number: 6435A Course Length: 5 Days Certification Exam This course will help you prepare for the following Microsoft exam: Exam 70647:

More information

RMAR Technologies Pvt. Ltd.

RMAR Technologies Pvt. Ltd. Course Name : StartXHack V2.0 Ethical Hacking & Cyber Security Course Duration : 2 Days (8Hrs./day) Course Fee : INR 1000/participant Course Module : 1. Introduction to Ethical Hacking a. What is Ethical

More information

Enterprise Computing Solutions

Enterprise Computing Solutions Business Intelligence Data Center Cloud Mobility Enterprise Computing Solutions Security Solutions arrow.com Security Solutions Secure the integrity of your systems and data today with the one company

More information

Intel Security Certified Product Specialist Security Information Event Management (SIEM)

Intel Security Certified Product Specialist Security Information Event Management (SIEM) Intel Security Certified Product Specialist Security Information Event Management (SIEM) Why Get Intel Security Certified? As technology and security threats continue to evolve, organizations are looking

More information

Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Includes Work Experience of 16 weeks with IT company

Microsoft MTA Qualifications. CompTIA Qualifications. Course Title: SUPPORT SPECIALIST (ITSS) Includes Work Experience of 16 weeks with IT company Course Title: IT SUPPORT SPECIALIST (ITSS) Program Type: Course Code: Award Type: Traineeship AT00005 Industry Professional Certification CompTIA and Microsoft Awards Objective Areas: Microsoft MTA; Server;

More information

Best Practices for Outdoor Wireless Security

Best Practices for Outdoor Wireless Security Best Practices for Outdoor Wireless Security This paper describes security best practices for deploying an outdoor wireless LAN. This is standard body copy, style used is Body. Customers are encouraged

More information

LINUX / INFORMATION SECURITY

LINUX / INFORMATION SECURITY LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

How We're Getting Creamed

How We're Getting Creamed ed Attacks How We're Getting Creamed By Ed Skoudis June 9, 2011 ed Attacks - 2011 Ed Skoudis 1 $ cut -f5 -d: /etc/passwd grep -i skoudis Ed Skoudis Started infosec career at Bellcore in 1996 working for

More information

GFI White Paper PCI-DSS compliance and GFI Software products

GFI White Paper PCI-DSS compliance and GFI Software products White Paper PCI-DSS compliance and Software products The Payment Card Industry Data Standard () compliance is a set of specific security standards developed by the payment brands* to help promote the adoption

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

Penetration Testing Report Client: Business Solutions June 15 th 2015

Penetration Testing Report Client: Business Solutions June 15 th 2015 Penetration Testing Report Client: Business Solutions June 15 th 2015 Acumen Innovations 80 S.W 8 th St Suite 2000 Miami, FL 33130 United States of America Tel: 1-888-995-7803 Email: [email protected]

More information