EC-Council Network Security Administrator (ENSAv4.0)
|
|
|
- Bethanie Claire Ferguson
- 10 years ago
- Views:
Transcription
1 EC-Council Network Security Administrator (ENSAv4.0) Delivery Method: Instructor-led (classroom), Duration: 5days Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyse the internal and external security threats against a network, and to develop security policies that will protect an organization s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. Who Should Attend System administrators, Network administrators and anyone who is interested in network security technologies. Learning Outcome Students are able Exam Information The ENSA exam will be conducted on the last day of training. Students need to pass the online Prometric exam to receive the ENSA certification. Course Outlines Module I: Fundamentals of Computer Network Key elements of network o Nodes o The Network Backbone o Segments o Subnets Logical Elements of Network o IP Addresses o Domain Name System o Gateways Types of network media o Historical vs. Current communication Methodology o Asynchronous vs synchronous o Wired media or Bounded Network Media o Dedicated line o Optical remanence
2 o Magnetic remanence o Wireless Transmission o Public switched network o Emanations security Media Access Methods o Multiplexed Media Access o Polling o Token-Based Media Access o Automated Information Systems (AIS) Automated Information Systems (AIS) o Historical vs. Current Technology o Hardware o Software o Memory Critical information characteristics o Confidentiality o Integrity o Availability Information states o Transmission o Stora1ge o Processing Operations Security (OPSEC) o OPSEC process o INFOSEC and OPSEC interdependency o Unclassified indicators o OPSEC surveys/opsec planning Object reuse(computer security) OSI Model o Physical Layer o Data Link Layer o Network Layer o Transport Layer o Session Layer o Presentation Layer o Application Layer Transmission Modes o Simplex o Half Duplex o Full Duplex Types of Transmission o Serial Data Transmission o Parallel Data Transmission o Unicast Transmission o Multicast Transmission
3 Logical Network Classification o Client Server networking o Peer to peer networking o Mixed Mode Networking Network Topologies o Sharing of data o Sharing of devices o File servers o Bus o Star or Hub o Star-Wired ring o Ring o Mesh o Tree o Hybrid Topology Physical Network Classification o LAN o WAN o MAN o PAN o CAN o GAN Network Equipments o Network Interface Cards o Access Points o Switches o Concentrators/hub o Modem o Asynchronous vs. synchronous o Router o Brouter o Bridges o Adapters o Network Load Balancers o Repeaters o Gateways o Transceivers o Converters o Terminals Module II: Network Protocols Introduction to protocols Implementing Network protocols o Introduction to TCP/IP o Configuring TCP/IP o Configuring Netware Links
4 o Managing TCP/IP o Network Classes o Terminal Emulation Protocol (TELNET) of TCP/IP o TELNET: Vulnerabilities o Network News Transfer Protocol o Network News Transfer Protocol: Vulnerabilities Application Layer Protocols o Voice Over Internet Protocol (VoIP) o Boot Strap Protocol (BOOTP) o Data Link Switching Client Access Protocol(DCAP) o Dynamic Host Configuration Protocol (DHCP) o Domain Name System(service) Protocol (DNS) o File Transfer Protocol (FTP) o Trivial FTP (TFTP) o FTP and Trivial FTP: Vulnerabilities o Network Time Protocol o Network News Transfer Protocol o Simple Network Management Protocol(SNMP) and Its Versions o Internet Relay Chat Protocol(IRCP) o Service Location Protocol(SLP) o Hyper Text Transfer Protocol (HTTP) o Hyper Text Transfer Protocol Secure (HTTPs) Presentation Layer Protocol o Light Weight Presentation Protocol(LWPP) Session Layer Protocol o Remote Procedure Call Protocol(RPC) Transport Layer Protocols o Reliable Data Protocol(RDP) o Transmission Control Protocol(TCP) o User Datagram Protocol(UDP) o TCP, UDP: Attacks and Countermeasures Network Layer Protocols o Routing Protocols o Multicasting Protocols o Other Network Protocols Data link Layer Protocol o Address Resolution Protocol(ARP) o Network Address Resolution Protocol (NARP) o Reverse Address Resolution Protocol(RARP) Module III: Protocol Analysis Overview of tcp/ip o Streams o Reliable delivery o Network adaption o Flow control
5 Relation to other Protocol Tcp/ip Protocol suite o Network Interface Layer o Internet Layer o Transport layer o Application Layer Windowing Sliding Window Acknowledgement TCP o TCP header format o TCP Interface o Algorithms in TCP o TCP Checksum Calculation o Performance Estimation in TCP o Problems related to TCP IP o Overview of IP o IP Header Format o IP Addressing o IP datagram o IPv6 o IPv6 Header o IPv6 Specification o Addressing o Packet Tunneling o Multicast o Hop by Hop option Module IV: Hardening Physical Security Need for physical security Security Statistics Physical Security Breach Incidents o Who is Accountable for Physical Security? Factors Affecting Physical Security Physical Security Threats o Environmental threats o Man Made threats o Prevention & Detection of physical hazards Premises Security o Office Security o CCT (Close Circuit Televisions/Cameras) o Parking Area EPS (Electronic Physical Security) Challenges in Ensuring Physical Security o Countermeasures
6 o Fencing o Security force o Watch Dogs o Locks and Keys o Physical Security: Lock Down USB Ports o Tool: DeviceLock o Blocking the Use of USB Storage Devices o Track Stick GPS Tracking Device o USB Tokens o Fire Safety: Fire Suppression, Gaseous Emission Systems o Uninterruptible Power Supplies o Mantrap Module V: Network Security Overview of Network Security The need for network security The goals of network security Security awareness Functions of Network security administrator o Develop, Maintain and implement IT security o Maintain and implement firewalls o Monitor and secure network and servers o Monitor critical system files o Backup the files o Administrative Security Procedural Controls o Documentation, logs and journals Communication Security (COMSEC) o Functions of COMSEC custodian o identify and inventory COMSEC material o access, control and storage of COMSEC material o report COMSEC incidents o destruction procedures for COMSEC material Functions of INFOSEC Officer Functions of information resources management staff program or functional managers security office senior management system manager and system staff telecommunications office and staff Functions of audit office Functions of OPSEC managers Role of end users Network Security at: o Public vs private o Dial-up vs dedicated o Privileges (class, nodes)
7 o Traffic analysis o End-to-end access control Transmission Security o Frequency hopping o Masking o Directional signals o Burst transmission o Optical systems o Spread spectrum transmission o Covert channel control (crosstalk) o Dial back o Line authentication o Line-of-sight o Low power o Screening o Protected wireline Legal Elements o Criminal prosecution o fraud, waste and abuse o Evidence collection and preservation o Investigative authorities Countermeasures: cover and deception o HUMINT o Technical surveillance countermeasures Reporting security violations Module VI: Security Standards Organizations Internet Corporation for Assigned Names and Numbers (ICANN) International Organization for Standardization (ISO) Consultative Committee For Telephone and Telegraphy (CCITT) International Telecommunication Union (ITU) American National Standards Institute(ANSI) Institute Of Electronics and Electrical Engineers(IEEE) Electronic Industries Association National Center for Standards and Certification Information (NIST) World Wide Web Consortium (W3C) Web Application Security Consortium (WASC) Module VII: Security Standards Introduction to Internet Standards Standards Creation Committee Internet Standards o RFC Evolution o Types and Submissions o Obtaining RFCs Cabling Standards
8 o EIA/TIA -568 o UTP Categories o Cable Specifications o Electronic Industries Association Specification Standards Module VIII: Security Policy Security Policy overview Concept of Security Policy Key Security Elements Security Awareness Programs o Trainings o Meetings o Goals of security Policies Vital role of a security policy Classification of Security policy o User policies o General Policies o Partner Policies o Types of Security Policies: Issues Specific Policies o Policy design Contents of Security Policy Privacy and Confidentiality Security levels o Separation of duties, dual controls, job rotation, least privilege o Security organization and policy development Agency Specific AIS and Telecommunications Policies o Points of contact o References Configuration of security policy National Policy and Guidance o AIS security o Communications security o Employee accountability for agency information Implementation of security policy Incident Handling and Escalation Procedures Security operations and life cycle management o Securing Assets o Requirements definition (e.g.,architecture) o Development o Design review and systems test o Demonstration and validation (testing) o Implementation o Security (e.g., certification and accreditation) o Operations and maintenance (e.g.,configuration management) Defining Responses to Security Violations
9 Presenting and Reviewing the Process Compliance with Law and Policy o Intellectual Property o Describing the Electronic Communications Privacy Act o Transborder encryption issues o Points To Remember While Writing Security Policy Issue-specific Security Policy (ISSP) o Security Policies o Hacking Creating and Managing ISSPs Module IX: IEEE Standards Introduction to IEEE standards IEEE LAN Protocol Specification o 802-Overview And Architecture o Briding And Management o Logical Link Control(LLC) o CSMA/CD(Ethernet) o Token Passing Bus o Token Passing Ring o DQDB Access Method o Broad Band LAN o Security o Wireless LAN(WLAN) o Demand Priority Access o Wireless Personal Area Networks (WPAN) o Broad Band Wireless MAN (WMAN) o Resilliant Packet Ring Work Group Wireless Networking Standards o IEEE Standards o 802.1X o Architecture o Standards (Wi-Fi Standard) o o o Wi-MAX o IEEE p1451 Standard o ETSI Standards o HIPERLAN o HIPERMAN Module X: Network Security Threats Current Statistics o Defining Terms: Vulnerability, Threats, and Attacks Types of Attackers Classification of Hackers Techniques
10 o Spamming o Revealing hidden passwords o War Dialing o War Diving o War Chalking o War Flying o Wire Tapping o Scanning o Sniffing o Network Reconnaissance o Social Engineering Common Vulnerabilities and Exposures (CVE) o Threats o Trojan o Virus o Worms o Logic Bombs o Eavesdropping o Phishing Attacks o Smurfing o Man-in-the-Middle Attacks o Denial of service o DDoS o Buffer Overflow o Zero Day Attacks o Jamming o Password Attacks o Spoofing o Session Hijacking o Web Page Defacement o Recording Key Strokes o Cracking Encrypted Passwords o Revealing Hidden Password Hiding Evidence of an Attack Problems Detecting Network Attacks Network Scanning Tools: o The Netstat Tool o Nmap o NetscanTool o Superscan o Hping Module XI: Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) Introduction to IDS
11 History of Intrusion Detection Intrusion Detection Concepts o Architecture o Monitoring Strategies o Analysis type o Timing o Goal of detection o Control Issues IDS for an Organization o Selecting an IDS o Deploying an IDS o Maintaining an IDS Characteristics of IDS o Importance of IDS Aggregate Analysis with IDS Types of IDS o Network based IDS o Host Based IDS o Host Based IDS vs. Network Based IDS o The Hybrid IDS Framework o Distributed IDS o Protocol Intrusion Detection System o Network Behavior Analysis (NBA) o Unified Thread Management Deployment of IDS Types of Signatures o Network signatures o Host based signatures o Compound Signatures True/False-Positive/Negative Major Methods of Operation o Signature Based Detection o Anomaly Based Detection IDS Tool o Snort o BlackICE o M-ICE o Secure4Audit (auditguard) o Emerald o Nides o SECUREHOST o GFI EventsManager Intrusion Prevention System o Intrusion Prevention Strategies o IPS Deployment Risks
12 o Flexible response with Snort o Controlling your Border Information Flow in IDS and IPS o Raw Packet Capture o Filtering o Packet Decoding o Storage o Fragment Reassembly o Stream Reassembly o Stateful Inspection of TCP Sessions o Firewalling IPS Tool o Sentivist o StoneGate IPS o McAfee IDS vs. IPS Intrusion Detection Checklist Module XII: Firewalls Firewalls: Introduction Security features o Securing individual users o Perimeter security for networks Multiple components of Firewall Firewall Operations Software Firewall Hardware Firewall Types of Firewalls o IP Packet Filtering Firewall o Circuit-Level Gateway o Application Level Firewalls Pix Firewall Basic features of PIX firewall Advanced Features of PIX firewall Firewall Features Establishing Rules and Restrictions for your Firewall Firewall Configuration Strategies Scalability Firewall Architecture o Dual-Homed Host Architecture o Screened Host Architecture o Screened Subnet Architecture Handling threats and security tasks Protection against hacking Centralization and Documentation
13 Multi-layer firewall protection Firewall deployment strategies o Screened Host o Two router with one firewall o Introduction to Demilitarized Zone(DMZ) o DMZ screened subnet o Multi firewall DMZ o Screening Router o Dual homed host Specialty firewalls and Reverse firewalls Advantages of using Firewalls Disadvantages of using Firewalls Threats o Firewalking o Banner Grabbing o Placing Backdoors Through Firewalls Limitations of Firewalls Personal Firewall Software o ZoneAlarm Pro o Norton Personal Firewall o McAfee Personal Firewall o Windows Personal Firewall Personal Firewall Hardware o Linksys and Netgear o Cisco s PIX Firewall Log Analysis Firewall Tools Comparison of Various Firewall Products T-REX Open Source Firewall SQUID WinGate Symantec Enterprise Firewall Firewall Testers o Firewalk o FTester o Firewall Leak Tester Module XIII: Packet Filtering and Proxy Servers Application layer gateway o Network Address Translation o Packet Filtering Proxy servers o Role of Proxy Server o Proxy Control o Authentication Process
14 o Firewall o Administration and management of Proxy servers o Security and access control o Reverse Proxies o How Proxy Servers Differ From Packet Filters Module XIV: Bastion Host and Honeypots Bastion Hosts o Principles o Need of Bastion host o Building a Bastion Host o Configuring Bastion Host o Locating Bastion Host o Securing the Machine Itself o Making the Host Defend Itself o Selecting Services to be Provided o Disabling Accounts o Disabling Unnecessary Services o Handling Backups o Role of Bastion host o Bastion Host security policy Honeypot o History of Honeypot o Value of Honeypot o Types of Honeypots o Classifying Honeypots by Interaction o Examples of Honeypots o Use of Honeypot o Homemade Honeypot o Advantages and Disadvantages of Honey pot Honeynet o Architecture of Honeynet o Types of Honeynet o Legal Issues related Module XV: Securing Modems Introduction to Modems Origin of Modems Modem Features Types of Modems o Hardware Modems o Optical Modems o Short Haul Modems o Smart Modem o Controller Less Modem o Acoustic Modem o Null modems
15 Modem Security o Additional Security to modems o Modem Security should be a priority for the telephony managers o SecureLogix provides Solutions for Modems Security o Make modem Security simple with robust Management Tool Categorizing Modem Access o Dial out Access o Dial In Access Modem Attacks o Spoofing Attacks o Call Forwarding Attacks o War Dialing Modem Risks o War Dialers o Packet Sniffing Modem Failure Symptoms o Modem Firmware Failure o Primary Modem Failure o Reasons for modem Connection Failure o Some Common Failures Troubleshooting Modems o External Modems o Internal Modems Module XVI: Troubleshooting Network Introduction to troubleshooting A Troubleshooting Methodology o Troubleshooting Strategies o Device Manager o Troubleshooting Network Communication o Network adapter has limited or no connectivity o Network adapter is connected, but you can t reach the Internet o Troubleshooting Connectivity o Performance Measurement Tool Troubleshooting Network devices o Windows PC Network Interface Card o Troubleshooting Cisco Aironet Bridge o Troubleshooting bridges using the Virtualization Engine o Troubleshooting BR350 (Bridge) o Diagnosing Repeater and Gateway Problems o Troubleshooting Hubs and Switches o Troubleshooting cable modem o Troubleshooting DSL or LAN Internet Connection o Troubleshooting a Universal Serial Bus Device o Troubleshooting IEEE 1394 Bus Devices Troubleshooting Network Slowdowns
16 o NetBios Conflicts o IP Conflicts o Bad NICs o DNS Errors o Insufficient Bandwidth o Excessive Network Based Application o Daisy Chaining o Spyware Infestation Troubleshooting Wireless devices o Checking the Led Indicators o Checking Basic setting o SSID o WEP Keys o Security Settings Troubleshooting Methodology TCP/IP Troubleshooting Utilities o Troubleshooting with IP Configuration Utilities o Troubleshooting with Ping o Troubleshooting with Tracert o Troubleshooting with Arp o Troubleshooting with Telnet o Troubleshooting with Nbstat o Troubleshooting with Netstat o Troubleshooting with FTP o Troubleshooting with Nslookup o Troubleshooting NTP o Troubleshooting Tools o Hardware-Based Troubleshooting Tools o Network Technician s Hand Tools o The POST Card o Memory Testers o Electrical Safety Rules o Wire Crimpers o Punch Down Tools o Circuit Testers o Voltmeters o Cable Testers o Crossover Cables o Hardware Loopback Plugs o LED Indicator Lights o Tone Generators Module XVII: Hardening Routers Introduction to Routers Routing Metrics Multiple Routing
17 Types of Routers Routing Algorithms Internet work Operating Systems (IOS) IOS: FEATURES Routing Principles o The ARP Process o LAN to- LAN Routing Process o LAN to- WAN Routing Process Modes Of Operation o User Mode o Enable Mode o Global Configuration MODE IP Routing o Configuring IP and IP routing o Configuring RIP IP Source Routing Configuration of Routers o External configuration sources o Internal configuration sources o Router Initiation o Loading the configuration files o Configuring from the TFTP Server o The Setup Configuration Mode o CLI configuration mode Router Configuration Modes o Global Configuration mode o Interface Configuration mode o Line Configuration Mode o Privilege EXEC mode o ROM Monitor mode o User EXEC Mode Finger Tool Disabling the auxiliary and closing extra interfaces BOOTp service TCP and UDP small servers Disabling Proxy ARP Disabling SNMP Disabling NTP Hardening a Router o Configuring a banner Cisco Discovery Protocol o Configuring CDP o Logging Concept o Cisco Logging Options
18 o Syslog Logging o SNMP Logging Filtering Network Traffic Access Control List o Basics of ACL o Creating Access Control List o ACl Types o Monitoring ACL o Implementing ACL o Securing Routers: ACL Log System Error Messages Securing Routers: Committed Access Rate Securing Routers: Secure Shell o Authentication methods o Configuring SSH o Default Locations of Secure Shell Files Router Commands o Configuring Router Interface setting o Managing Router Configuration o Reviewing IP Traffic and Configuring static Routers Types of Routing o Distance Vector Routing o Link State Routing Routing Protocols o Routing Information Protocol (RIP) o Interior Gateway Routing Protocol (IGRP) o Enhanced Interior Gateway Routing Protocol (EIGRP) o Open Shortest Path First (OSPF) o Border Gateway Protocol (BGP) Routing Table Maintenance Protocol (RTMP) Troubleshooting a router o Troubleshooting tools o Troubleshooting with network management tools o Troubleshooting IP Connectivity in Routers Components of router security Router security: testing tools Module XVIII: Hardening Operating Systems BIOS security Windows Registry o Registry Editor o Rootkit Revealer Configuring Windows Services o Services o Regional settings o Virtual Servers
19 o Share Point Portal Server o Antivirus Protection o Process Resource Access o Managing Access control o Resource Access Privileges o Access Lists o Need-to-know controls o Malicious logic protection o Assurance Discretionary Access Control List (DACL) Objects And Permissions Rights Vs Permissions NTFS File System Permissions Encryption File System Windows Network Security o Firewalls Modes of Operation (Describes the security conditions under which the system actually functions) o Dedicated security mode o System-high security mode o Compartmented security mode o Multilevel security mode AIS o Hardware o Software o Firmware Windows infrastructure features o Active Directory o Group Policy o Share Security o Dynamic DNS updates Kerberos Authentication And Domain Security Trust Relationships Between Domains IP Security o Problems With IP Security Windows Security Tools o Update System o Antivirus o Anti Spyware o Anti Spam Windows o Windows Server 2003 Windows Certificate Authorities Certificate Authority Requirements
20 o Implement Certificate Authorities o Implement a Enterprise Root CA Desktop Management o Concept of least privilege o Internal labeling o Troubleshoot User Logons o Troubleshoot User Configuration o Troubleshoot System performance File Management o Troubleshooting Access to Files And Folders o Troubleshooting Access to Shared Files And Folders Linux o User and File system Security Administration Pluggable Authentication Module Configuring PAM Pam Configuration Files PAM Framework Security With PAM Network Information Services Group Management Utilities Permission Management Tools System Logger Utility Unix Security o UNIX Security Checklist v2.0 Macintosh Security Vista security o Upgrading from XP to Windows Vista o Installing Windows Vista o Securing Windows Vista Module XIX: Patch Management Introduction The Patch Concept Patch testing Patch Monitoring and Management o Create a Change Process o Monitor the Patch Process Consolidating Patches on Red hat Network o Configuring the Proxy Server o Configuring the Proxy Client Red Hat Up2date Patch Management Utility Installation Steps Red Hat Up2date Patch Management: Command Line Interface o Security Patch Compliance o Distribution o Discovery and zero-touch inventory
21 o Client Adoption o Troubleshoot Security Patch Management Reporting Patch Management Process o Identification o Assessment Phase o Base Lining o Obtainment o Testing o Deploy Phase o Confirmation Windows Update Services o Software Update Services (SUS) o Windows Server Update Services (WSUS) o WSUS VS SMS 2003 o Role of SMS in Patch Management Process Patch Management Tool: Baseline Security Analyzer o MBSA: Scanning Updates in GUI Mode o MBSA: Scanning Updates in Command-line version 12. Patch Management Tool o Selecting a Tool o Baseline Security Analyzer o Qchain o BES Patch Management o Shavlik HFNetChkPro 5 o PatchLink Update o SecureCentral PatchQuest Module XX: Log Analysis Introduction to Log Analysis Overview of log analysis Audit Events Log Files o Apache Logs o IIS Logs o IIS Logger Limitations of log files Monitoring for Intrusion and Security Event o Importance of Time Synchronization o Passive Detection Methods o Scripting Log Analysis Tools o UserLock o WSTOOl o Auditing tools o Generic Log Parsing Tools
22 o Log File Rotation Tools How to Secure Logs(Log Security) o Limit Access To Log Files o Avoid Recording Unneeded Sensitive data o Protect Archived Log Files o Secure The Processes That Generate the Log Entries o Configure each log source to behave appropriately when logging errors occur o Implement secure mechanisms for transporting log data from the system to the centralized log management servers Inc setting up of Servers: IIS & Apache Module XXI: Application Security Importance of Application Security Why Is Web Security So Difficult? Application Threats and Counter Measures Application dependent guidance Web Applications o Managing Users o Managing Sessions o Encrypting Private Data o Event Logging System Life Cycle Management o acquisition o design review and systems test performance (ensure required safeguards are operationally adequate) o determination of security specifications o evaluation of sensitivity of the application based upon risk analysis o management control process (ensure that appropriate administrative, physical, and technical safeguards are incorporated into all new applications and into significant modifications to existing applications) o systems certification and accreditation process Telecommunications Systems o Hardware o Software o Vulnerability and threat that exist in a telecommunications system o Countermeasures to threats Securing voice communications Securing data communications Securing of keying material Transmission security countermeasures (e.g., callsigns, frequency, and pattern forewarning protection) Embedded Application Security (EMBASSY) o TCP/IP security Technology o IPSec And SSL Security o IPSec And SSL Security In Embedded Systems o Network Security For Embedded Applications
23 o Embedded Network Security Hardware Instructions Secure Coding o Common Errors o Best Practices For Secure Coding o Programming standards and controls o Change controls o internal labeling Threat modeling Module XXII: Web Security Overview of Web Security Common Threats on Web o Identity theft o Spam Mail o Distributed Denial of Service(DDoS) o Reflection Dos Attack o Bots o Cross Site Request Forgery o Session Hijacking o Smurf attack o FTP bounce o RSS/Atomic Injection o DNS Attack o Content Spoofing o Logical Attacks o Buffer Overflow o IP and Routing Protocol Spoofing Identifying Unauthorized Devices Restrictive Access Network Addresses o Altering the Network Addresses Tracking the Connectivity: Tracert/Traceroute Testing the Traffic Filtering Devices IIS Server o Installing the IIS server o Administering the IIS server Client Authorization o Certificate Authorities Client-Side Data Server-side data Client Authentication o User s Approach o Authentication Techniques Input Data Validation Browsing Analysis Browser Security
24 o Mozilla Browser o Internet Explorer o Browser hijacking o Browser Analysis o Browser Security Settings Plug-ins o Netscape/IE Plug-Ins o Mozilla Firefox Plug-ins o Accessibility Analyzer o Validate Sites HTML o Wayback Versions o Validate P3P o View In o BugMe Not o Webpage Speed Report o Validate Links (W3C) o Open Text o Validate RSS o Validate CSS o Validate HTML Common Gateway Interface(CGI) o CGI Script o CGI operation Module XXIII: Security Overview of History of Basics of Types of Web Based Versus POP3 Components of an o Headers o Opening Attachments o Reading s for different clients o Field names and values o Address list o Recipients and Senders o Response targets and threading Servers Encryption o Centurion mail o Kerberos o Hush Mail o Pretty good privacy o Secure Hive Installing WorkgroupMail
25 Configuring Outlook Express Secure Authentication o Mail Transfer o Authenticating Sender protocols o Multipurpose Internet Mail Extensions(MIME) /Secure MIME o Pragmatic General Protocol(PGP) o Simple Mail Transfer Protocol(SMTP) o Post Office Protocol(POP) and its POP3 o Internet Message Access Protocol(IMAP) Client and server architecture Security Risks o Spoofed Addresses o Spam o Hoaxes o Phishing o Snarfing o Malware o spoofing o viruses o Gateway virus scanners o Outlook Viruses o Attachment Security o Spamming How to defend against security risks o Quarantining Suspicious o Vulnerability check on System Tools for Security o ClipSecure o CryptoAnywhere o BCArchive o CryptainerLE o GfiMailEssentials o SpamAware Tracking s o readnotify Module XXIV: Authentication: Encryption, Cryptography and Digital Signatures Authentication o Authentication Tokens o RSA SecurID o Smart Cards VeriSign Authentication Encryption o Encryption Systems
26 o Firewalls Implementing Encryption o Lack of Encryption o Cost of encryption o Preserving data integrity o Maintaining confidentiality o Authentication and Identification o Authenticity of N/W clients o Key Based Encryption Systems o Encryption Algorithms o Analyzing popular encryption schemes o Types of Encryption Algorithms o Hashing algorithms Cryptography o History of Cryptography o Math and Algorithms o Message Authentication o Strength (e.g., complexity, secrecy, characteristics of the key) o Cryptovariable or key Digital Certificates o Paper Certificates and Identity Cards o Authorities that Issue Physical Certificates o Difference Between Physical and Digital Certificates o Standards For Digital Certificates o X.509 as Authentication Standard o Public Key Certificate o Viewing digital certificates Certificate Encryption Process o Encrypted File System Public and Private Keys o A Public Key Generated by PGP o Choosing the size of keys o Generating Keys Digital Signatures o Signature as identifiers o Features of Digital Signatures o Digital Signature In practice o PKI key management protocols (bundling, electronic key, over-the-air rekeying) Module XXV: Virtual Private Networks and Remote Networking Introduction to Virtual Private Network Types of VPN o Remote Access VPN s o Intranet Access VPN s o ExtraNet VPN s Tunneling
27 o Fundamentals of TunnelingTunneling Protocol Point to point Tunneling Protocol(PPTP) o Goals And Assumptions o Terminology o Control Connections o Security And Disadvantages Layer 2 Tunnel Protocol o Characteristics o L2TP Header Format o L2TP Control Message header o L2TP Data message o L2TP Compulsory Tunnel o L2TP Voluntary Tunnel VPN Security o Encryption o IPSec Server o AAA Server Connection to VPN o SSH And PPP o Concentrator o Other Methods Step1: Setting Up VPN Step2: Implement DHCP Services Step3: Create An Enterprise Certificate Authority Step 4: Install IAS Step 5: Configure IAS Step 6: Create A Remote Access Policy Step 7: Configure The VPN Server Step 8: Associate The VPN Server With The DHCP Server Step 9: Configure Remote Clients Step 10: Test The Client Connection VPN Policies VPN Registrations And Passwords Risk Associated With VPN Pre Implementation Review Auditing Implementation Review Auditing Post Implementation Review And Reporting VPN Product Testing Common VPN Flaws Module XXVI: Wireless Network Security Introduction to Wireless o Types of wireless networks: WLAN, WWAN, WPAN and WMAN o Wired Vs. Wireless Networks o Advantages and Disadvantages of Wireless
28 Types of Wireless Networks o Based on Type of Connection o Based on Geography Components of Wireless Network o Access Points o Wireless Cards o Antenna o Wireless Desktop Cards o Wireless Laptop Cards o Wireless USB Adapters o Wireless Internet Video Camera o Digital Media Adapter o Wireless Converters o Wireless Print Server o Wireless Rechargeable Bluetooth mouse o Wireless Modems o Wireless Router o Wireless Gateways o Wireless USB o Wireless Game Adapter o Wireless Range Extender o GSM Network Devices Wireless Technologies o Personal Communication Services(PCS) o Time Division Multiple Access(TDMA) o Code Division Multiple Access(CDMA) o ARDIS o BlueTooth o Ultra Wideband Wireless Communications: Examples o Satellite communications o Cellular phone communications Devices using Wireless Communications o PDA o BlackBerry Service Set IDentifier (SSID) Detecting Wireless Network o How to scan o Tool: Kismet o Netstumbler Types of Wireless Attacks o Man in the Middle Attacks o Denial of Service or Distributed Denial of Service o Social Engineering o Weak key Attacks
29 o Dictionary Attacks o Birthday Attacks Wireless Threats o Rogue Access Points o MAC Sniffing and AP Spoofing Overview of Wi-Fi o Hotspot Open Wi-Fi Vulnerabilities o Unauthorized Network Access o Eavesdropping WLANs in Public Space o Security Vulnerabilities With Public Access Wireless Networks o Risks Due To Wireless Networks Wired Equivalent Privacy o WEP Key Cracking Tools o WAP o Wireless Network Attack Tool: AirSnarf o Tools to detect MAC Address Spoofing: Wellenreiter v2 o WLAN Management o Detecting Rogue Points Wireless Security o Authentication o WPA o Security Measures o WLAN Security Policy Development Issues o RADIUS Authentication Wireless Auditing o Baselining DHCP Services o Server And Client Mobile Security Through Certificates Certificate Management Through PKI Trouble Shooting Wireless Network o Multipath and Hidden Node Wireless Network Security Checklist Module XXVII: Creating Fault Tolerance Network Security: Fault Tolerance Why Create Fault Tolerance o Planning For Fault Tolerance Network Security o Key Aspect of Fault Tolerance o Fault Tolerant Network Reasons for Network Failure o Viruses And Trojans o Intrusion
30 o Power Supply Failure Reasons For System Failure o Crime o User Error o Environmental o Routine Events Preventive Measures o Physical Security o Backups o Practical tips o Setting Privileges o Access Rights o Partitions o Peripherals o UPS And Power Generators o RAID o Clustered Servers o Simple Server Redundancy o Archiving o Auditing o Privacy o Deployment Testing o Circuit Redundancy o Offsite Storage o Perimeter Security o Understanding Vulnerabilities o Authentication Module XXVIII: Incident Response What is an Incident Category of Incident Types of Incident o Who should I report an Incident Step by Step Procedure o Managing Incidents What Is an Incident Response o Incident Response Architecture Six Step Approach for Incident Handling (PICERF Methodology) o Preparation o Identification o Containment o Eradication o Recovery o Follow-up Incident Response Team o Basic Requirements
31 o Ways of Communication o Staffing Issues o Stages Obstacles in Building a Successful Incident Response Team Computer Security Incident Response Team o Services Module XXIX: Disaster Recovery and Planning Overview of Disaster and its types What is a Disaster Recovery Principles of Disaster Recovery Types of Disaster Recovery Systems o Synchronous Systems o Asynchronous Systems Backup Site Recovery of Small and Large Computer Systems Emergency Management Disaster Recovery Planning Security Planning o Directives and procedures for NSTISS policy o Program budget Process of Disaster Recovery Plan o Organizing o Training o Implementing Disaster Recovery Testing o Testing Process o Testing Steps o Testing Scenarios Contingency Planning/Disaster Recovery contingency plan components, agency response procedures and continuity of operations team member responsibilities in responding to an emergency situation guidelines for determining critical and essential workload determination of backup requirements development of procedures for off-site processing development of plans for recovery actions after a disruptive event emergency destruction procedures Disaster Recovery Planning Team o Training the Disaster Recovery Planning Team Business Process Inventory Risk Analysis o Concept of risk Analysis o Methods of Risk Analysis o Process of Risk Analysis
32 o Continuous Risk Assessment o Techniques To minimize Risk o Cost/benefit analysis of controls o Implementation of cost-effective controls Risk Management o Information identification o roles and responsibilities of all the players in the risk analysis process o risk analysis and/or vulnerability assessment components o risk analysis results evaluation o corrective actions o acceptance of risk (accreditation) Business Continuity Planning Process o Business Impact Analysis o Risk Assessment o Other Policies, standards and process o Monitoring o Business Continuity Management Emergency destruction procedures Six myths about Business Continuity Management and Disaster Recovery Disaster Prevention Module XXX: Network Vulnerability Assessment Vulnerability Assessment o Vulnerability Assessment services o Goals of vulnerability assessment Features of a good vulnerability assessment o Network Vulnerability Assessment Timeline o Network Vulnerability Assessment Team Vulnerability classes Source Of Vulnerabilities o Design Flaws o Poor Security management o Incorrect Implementation Choice of Personnel for Network Vulnerability Assessment Network vulnerability Assessment methodology: o Phase 1- Acquisition o Phase 2 - Identification o Phase 3 - Analyzing o Phase 4 - Evaluation o Phase 5 - Generation How to assess vulnerability assessment tools Selecting vulnerability assessment tools o SAINT o Nessus o BindView o Nmap
33 o Ethereal o Retina o Sandcat Scanner o Vforce o 8.9. NVA-Team Checklist o ScanIT Online
CH ENSA EC-Council Network Security Administrator Detailed Course Outline
CH ENSA EC-Council Network Security Administrator Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Advance Ethical
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led
EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view.
Network Security Administrator
Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems
Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems Page 1 of 12 Course Description The Network Defense Series from EC-Council Press is comprised of 5 books
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01
JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT Test Code: 4514 Version: 01 Specific Competencies and Skills Tested in this Assessment: PC Principles Identify physical and equipment
Networking Technology Online Course Outline
Networking Technology Online Course Outline Introduction Networking Technology Introduction Welcome to InfoComm University About InfoComm International About Networking Technology Network Technology Course
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
ENSA Training - EC-Council Network Security Administrator
ENSA Training - EC-Council Network Security Administrator Course Number: 312-38 Course Overview This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
EC-COUNCIL NETWORK SECURITY ADMINISTRATOR (ENSA) TRAINING (SINGLE-USER, DVD-ROM)
EC-COUNCIL NETWORK SECURITY ADMINISTRATOR (ENSA) TRAINING (SINGLE-USER, DVD-ROM) Module 1 - Fundamentals of the Network Fundamentals of the Network Key Elements of a Network Nodes The Network Backbone
Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer
Joseph Migga Kizza A Guide to Computer Network Security 4) Springer Contents Part I Understanding Computer Network Security 1 Computer Network Fundamentals 1.1 Introduction 1.2 Computer Network Models
Course Description and Outline. IT Essential II: Network Operating Systems V2.0
Course Description and Outline IT Essential II: Network Operating Systems V2.0 Course Outline 1. Operating System Fundamentals 1.1 Operating System Basics 1.1.1 Overview of PC operating systems 1.1.2 PCs
Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0
COURSE OVERVIEW Implementing Secure Converged Wide Area Networks (ISCW) v1.0 is an advanced instructor-led course that introduces techniques and features that enable or enhance WAN and remote access solutions.
A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.
A firewall is a software- or hardware-based network security system that allows or denies network traffic according to a set of rules. Firewalls can be categorized by their location on the network: A network-based
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months
FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY
FBLA Cyber Security aligned with Common Core 6.14. FBLA: Cyber Security RST.9-10.4 RST.11-12.4 RST.9-10.4 RST.11-12.4 WHST.9-10.4 WHST.11-12.
Competency: Defend and Attack (virus, spam, spyware, Trojans, hijackers, worms) 1. Identify basic security risks and issues to computer hardware, software, and data. 2. Define the various virus types and
EUCIP - IT Administrator. Module 5 IT Security. Version 2.0
EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single
COMPUTER NETWORK TECHNOLOGY (300)
Page 1 of 10 Contestant Number: Time: Rank: COMPUTER NETWORK TECHNOLOGY (300) REGIONAL 2014 TOTAL POINTS (500) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker
Microsoft CompTIA Network+ Rapid Review (Exam N10-005) Craig Zacker Introduction xix Preparing for the exam xxiii Chapter 1 Network Concepts 1 Objective 1.1: Compare the layers of the OSI and TCP/IP models
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Eleventh Hour Security+
Eleventh Hour Security+ Exam SYO-201 Study Guide I do Dubrawsky Technical Editor Michael Cross AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO SYNGRESS.
Introduction p. 2. Introduction to Information Security p. 1. Introduction
Introduction p. xvii Introduction to Information Security p. 1 Introduction p. 2 What Is Information Security? p. 3 Critical Characteristics of Information p. 4 CNSS Security Model p. 5 Securing Components
CompTIA Security+ (Exam SY0-410)
CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
"Charting the Course...
Description "Charting the Course... Course Summary Interconnecting Cisco Networking Devices: Accelerated (CCNAX), is a course consisting of ICND1 and ICND2 content in its entirety, but with the content
Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200
Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200 Course Description: Advanced Cybersecurity is designed to provide students the advanced concepts and terminology of
Recommended IP Telephony Architecture
Report Number: I332-009R-2006 Recommended IP Telephony Architecture Systems and Network Attack Center (SNAC) Updated: 1 May 2006 Version 1.0 [email protected] This Page Intentionally Left Blank ii Warnings
COMPUTER NETWORK TECHNOLOGY (40)
PAGE 1 OF 9 CONTESTANT ID# Time Rank COMPUTER NETWORK TECHNOLOGY (40) Regional 2012 TOTAL POINTS (450) Failure to adhere to any of the following rules will result in disqualification: 1. Contestant must
How To Teach Network Security Administrator (Ensa)
EC-Council Network Security Administrator (Exam 312-38) Page 1 EC-Council NSA is CNSS 4011 Certified The Committee on National Security Systems (CNSS)/National Security Agency (NSA) of the United States
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01
CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA Test Code: 8148 Version: 01 Specific competencies and skills tested in this assessment: Personal and Environmental Safety Wear personal protective
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
10605164 Medical Networks and Operating Systems
Western Technical College 10605164 Medical Networks and Operating Systems Course Outcome Summary Course Information Description Instructional Level Total Credits 4.00 Total Hours 108.00 A course studying
Networking 4 Voice and Video over IP (VVoIP)
Networking 4 Voice and Video over IP (VVoIP) Course Objectives This course will give delegates a good understanding of LANs, WANs and VVoIP (Voice and Video over IP). It is aimed at those who want to move
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
642 552 Securing Cisco Network Devices (SND)
642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,
ASM Educational Center (ASM) Est. 1992
CompTIA Network+ Certification Course Outline Objective 1.1 - The OSI and TCP/IP Models The OSI and TCP/IP Models OSI Layer 7 OSI Layer 6 OSI Layer 5 OSI Layer 4 OSI Layer 3 OSI Layer 2 OSI Layer 1 LAN
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ICANWK406A Install, configure and test network security
ICANWK406A Install, configure and test network security Release: 1 ICANWK406A Install, configure and test network security Modification History Release Release 1 Comments This Unit first released with
Chapter 1 The Principles of Auditing 1
Chapter 1 The Principles of Auditing 1 Security Fundamentals: The Five Pillars Assessment Prevention Detection Reaction Recovery Building a Security Program Policy Procedures Standards Security Controls
Network Access Security. Lesson 10
Network Access Security Lesson 10 Objectives Exam Objective Matrix Technology Skill Covered Exam Objective Exam Objective Number Firewalls Given a scenario, install and configure routers and switches.
FBLA: NETWORKING CONCEPTS. Competency: General Network Terminology and Concepts
Competency: General Network Terminology and Concepts 1. Demonstrate knowledge of the purposes, benefits, and risks for installing a network. 2. Identify types of networks (e.g., LAN, WAN, MAN) and their
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill
CompTIA Security+ Certification Study Guide (Exam SYO-301) Glen E. Clarke McGraw-Hill is an independent entity from CompTIA,This publication and CD may be used in assisting students to prepare for the
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
Contents Introduction xxvi Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers
Contents Introduction xxvi Chapter 1: Understanding the Threats: E-mail Viruses, Trojans, Mail Bombers, Worms, and Illicit Servers 1 Introduction 2 Essential Concepts 3 Servers, Services, and Clients 3
Chapter 9 Firewalls and Intrusion Prevention Systems
Chapter 9 Firewalls and Intrusion Prevention Systems connectivity is essential However it creates a threat Effective means of protecting LANs Inserted between the premises network and the to establish
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
Local Area Networks (LANs) Blueprint (May 2012 Release)
Local Area Networks (LANs) The CCNT Local Area Networks (LANs) Course April 2012 release blueprint lists the following information. Courseware Availability Date identifies the availability date for the
Network Security and Firewall 1
Department/program: Networking Course Code: CPT 224 Contact Hours: 96 Subject/Course WEB Access & Network Security: Theoretical: 2 Hours/week Year Two Semester: Two Prerequisite: NET304 Practical: 4 Hours/week
Lesson 1 Quiz. 2012 Certification Partners, LLC. All Rights Reserved. Version 2.0
Quiz Answers-1 Lesson 1 Quiz 1. A server is: a. a computer connected to a mainframe. b. a computer that acts as a mainframe. c. a computer that shares resources with other computers on a network. d. a
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Section 12 MUST BE COMPLETED BY: 4/22
Test Out Online Lesson 12 Schedule Section 12 MUST BE COMPLETED BY: 4/22 Section 12.1: Best Practices This section discusses the following security best practices: Implement the Principle of Least Privilege
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA
Firewalls Securing Networks Chapter 3 Part 1 of 4 CA M S Mehta, FCA 1 Firewalls Learning Objectives Task Statements 1.3 Recognise function of Telecommunications and Network security including firewalls,..
MIS NETWORK ADMINISTRATOR PROGRAM
Network + Networking NH5200 Fundamentals COURSE TITLE: Network+ Networking Fundamentals 104 Total Hours COURSE OVERVIEW: After completing this course, students will be able to perform tasks such as: Installation
Post-Class Quiz: Telecommunication & Network Security Domain
1. What type of network is more likely to include Frame Relay, Switched Multi-megabit Data Services (SMDS), and X.25? A. Local area network (LAN) B. Wide area network (WAN) C. Intranet D. Internet 2. Which
IINS Implementing Cisco Network Security 3.0 (IINS)
IINS Implementing Cisco Network Security 3.0 (IINS) COURSE OVERVIEW: Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles and technologies, using
Implementing Cisco IOS Network Security
Implementing Cisco IOS Network Security IINS v3.0; 5 Days, Instructor-led Course Description Implementing Cisco Network Security (IINS) v3.0 is a 5-day instructor-led course focusing on security principles
2. From a control perspective, the PRIMARY objective of classifying information assets is to:
MIS5206 Week 13 Your Name Date 1. When conducting a penetration test of an organization's internal network, which of the following approaches would BEST enable the conductor of the test to remain undetected
INTRUSION DETECTION SYSTEMS and Network Security
INTRUSION DETECTION SYSTEMS and Network Security Intrusion Detection System IDS A layered network security approach starts with : A well secured system which starts with: Up-to-date application and OS
Tim Bovles WILEY. Wiley Publishing, Inc.
Tim Bovles WILEY Wiley Publishing, Inc. Contents Introduction xvii Assessment Test xxiv Chapter 1 Introduction to Network Security 1 Threats to Network Security 2 External Threats 3 Internal Threats 5
APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)
APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &
Fundamentals of Network Security - Theory and Practice-
Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring
Chapter 15: Computer and Network Security
Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How
HANDBOOK 8 NETWORK SECURITY Version 1.0
Australian Communications-Electronic Security Instruction 33 (ACSI 33) Point of Contact: Customer Services Team Phone: 02 6265 0197 Email: [email protected] HANDBOOK 8 NETWORK SECURITY Version 1.0 Objectives
Assessing Network Security
Microsoft Assessing Network Security Kevin Lam David LeBlanc Ben Smith Acknowledgments Foreword Introduction xxi xxiii xxvii Parti 1 Introduction to Performing Security Assessments 3 Role of Security Assessments
7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?
7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk
EC-Council Network Security Administrator
Page 1 Network Security Administrator Page 2 Network Security Administrator Version 4 is CNSS 4011 Approved Page 3 E SA TM N Network Security Administrator Course Description The s Network Security Administrator
Networking. Sixth Edition. A Beginner's Guide BRUCE HALLBERG
Networking A Beginner's Guide Sixth Edition BRUCE HALLBERG Mc Graw Hill Education New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto Contents Acknowledgments
ICTTEN8195B Evaluate and apply network security
ICTTEN8195B Evaluate and apply network security Release 1 ICTTEN8195B Evaluate and apply network security Modification History Release Release 2 Comments This version first released with ICT10 Integrated
Network Security. Tampere Seminar 23rd October 2008. Overview Switch Security Firewalls Conclusion
Network Security Tampere Seminar 23rd October 2008 1 Copyright 2008 Hirschmann 2008 Hirschmann Automation and and Control GmbH. Contents Overview Switch Security Firewalls Conclusion 2 Copyright 2008 Hirschmann
Associate in Science Degree in Computer Network Systems Engineering
Moorpark College Associate in Science Degree in Computer Network Systems Engineering To earn an Associate in Science Degree with a major in Computer Network Systems Engineering, students complete 40.5-45
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
GSEC GIAC Security. Essentials Certification ONE ALL IN EXAM GUIDE. Ric Messier. Singapore Sydney Toronto
ALL IN ONE GSEC GIAC Security Essentials Certification EXAM GUIDE Ric Messier New York Chicago San Francisco Athens London Madrid Mexico City Milan New Delhi Singapore Sydney Toronto "4 McGraw-Hill Education
Network Security Fundamentals
APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6
Cisco ASA, PIX, and FWSM Firewall Handbook
Cisco ASA, PIX, and FWSM Firewall Handbook David Hucaby, CCIE No. 4594 Cisco Press Cisco Press 800 East 96th Street Indianapolis, Indiana 46240 USA Contents Foreword Introduction xxii xxiii Chapter 1 Firewall
Network Security Foundations
Network Security Foundations Matthew Strebe O San SrBBC Francisco London Introduction xv Chapter 1 Security Principles 1 Why Computers Aren't Secure 2 The History of Computer Security 4-1945 5 1945-1955
BUY ONLINE FROM: http://www.itgovernance.co.uk/products/497
CISSP EXAM CRAM 2 1. The CISSP Certification Exam. Assessing Exam Readiness. Taking the Exam. Multiple-Choice Question Format. Exam Strategy. Question-Handling Strategies. Mastering the Inner Game. 2.
Networking. Systems Design and. Development. CRC Press. Taylor & Francis Croup. Boca Raton London New York. CRC Press is an imprint of the
Networking Systems Design and Development Lee Chao CRC Press Taylor & Francis Croup Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Croup, an Informa business AN AUERBACH BOOK
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
Security Technology: Firewalls and VPNs
Security Technology: Firewalls and VPNs 1 Learning Objectives Understand firewall technology and the various approaches to firewall implementation Identify the various approaches to remote and dial-up
Essential Curriculum Computer Networking 1. PC Systems Fundamentals 35 hours teaching time
Essential Curriculum Computer Networking 1 PC Systems Fundamentals 35 hours teaching time Part 1----------------------------------------------------------------------------------------- 2.3 hours Develop
information security and its Describe what drives the need for information security.
Computer Information Systems (Forensics Classes) Objectives for Course Challenges CIS 200 Intro to Info Security: Includes managerial and Describe information security and its critical role in business.
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
Designing and Developing Scalable IP Networks
Designing and Developing Scalable IP Networks Guy Davies Telindus, UK John Wiley & Sons, Ltd Contents List of Figures List of Tables About the Author Acknowledgements Abbreviations Introduction xi xiii
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
Lesson Plans Managing a Windows 2003 Network Infrastructure
Lesson Plans Managing a Windows 2003 Network Infrastructure (Exam 70-291) Table of Contents Course Overview... 2 Section 0.1: Introduction... 3 Section 1.1: Client Configuration... 4 Section 1.2: IP Addressing...
Network Security: A Practical Approach. Jan L. Harrington
Network Security: A Practical Approach Jan L. Harrington ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann is an imprint of
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router
Test Code: 8148 / Version 1
Blueprint Computer Systems Networking PA Test Code: 8148 / Version 1 Copyright 2013. All Rights Reserved. General Assessment Information Computer Systems Networking PA Blueprint Contents General Assessment
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006
Enterprise Cybersecurity Best Practices Part Number MAN-00363 Revision 006 April 2013 Hologic and the Hologic Logo are trademarks or registered trademarks of Hologic, Inc. Microsoft, Active Directory,
How To Pass A Credit Course At Florida State College At Jacksonville
Form 2A, Page 1 FLORIDA STATE COLLEGE AT JACKSONVILLE COLLEGE CREDIT COURSE OUTLINE COURSE NUMBER: CTS 2658 COURSE TITLE: PREREQUISITE(S): COREQUISITE(S): Managing Network Security CNT 2210 with grade
Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶
Network Security 網 路 安 全 Lecture 1 February 20, 2012 洪 國 寶 1 Outline Course information Motivation Introduction to security Basic network concepts Network security models Outline of the course 2 Course
