Network Traffic and Security Analysis
|
|
|
- Russell McBride
- 10 years ago
- Views:
Transcription
1 Network Traffic and Security Analysis Sample 5-Day Course Outline
2 Course Formats Available This 5-day course can be provided in two formats: Online Instructor-Led Training Generally provided in 3-hour or 6-hour increments over several days or spread over several weeks. An excellent option when students are geographically disbursed. This course can be customized using your own trace files. Get a course price estimate or formal course quote at (Pricing section). See Training Facility Requirements on page 8 for course setup details. Onsite Instructor-Led Training Offering hands-on lab-based training at your location or a venue convenient for your team, this option is ideal for small or large audience sizes who prefer in-person instruction and a more personalized training approach. This course can be customized using your own trace files. Get a course price estimate or formal course quote at (Pricing section). See Training Facility Requirements on page 8 for course setup details. Also Available All Access Pass (AAP) Visit to learn more about the All Access Pass, One year subscription (single seat license) Online recorded training sessions Course progress tracking and transcripts Course certificates Access to monthly live online training events Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 1
3 Course Description This 5-day course offers hands-on training in network traffic security analysis and network forensics. This course begins with the core tasks and techniques for TCP/IP analysis (IP, TCP, UDP, ARP, DHCP, HTTP, POP/SMTP, ICMP, VoIP, WLAN traffic) and moves into capture and analysis techniques for evidence of reconnaissance and breach patterns on the network. Students must provide their own laptops pre-loaded with the latest stable release of Wireshark ( The instructor will provide traffic analysis trace files for use in hands-on labs (on DVD). If you provide trace files for customization of course materials, those trace files will also be distributed as course materials. Course Outline and Estimated Daily Breaks The schedule listed is tentative and will fluctuate depending on customer s needs and focus during the course. DAY ONE Course Set Up and Analyzer Testing 1. Network Analysis Overview 1.1. Security Tasks for the Network Analyst 1.2. Application Analysis Tasks for the Network Analyst 1.3. Security Issues Related to Network Analysis 1.4. Legal Issues Related to Listening to Network Traffic 1.5. Overcome the "Needle in a Haystack" Issue 2. Wireshark Functionality Overview 2.1. Capturing Packets on Wired or Wireless Networks 2.2. Open Various Trace File Types Wiretap Library 2.3. How Wireshark Processes Packets Dissectors, Filters 2.4. Key Wireshark Techniques Filter/WLAN Toolbar, Status Bar, Profiles, Right-Click 3. Capturing Wired and Wireless Traffic 3.1. Know Where to Tap into the Network Wired/WLAN, Duplex Issues, Switches 3.2. Infrastructure Effects NAT/PAT, QoS Routing, VLANs, APs 3.3. Options for Remote Capture 3.4. Using File Sets and Optimizing for Large Capture Quantity 3.5. Conserve Memory with Command-line Capture (Tshark, dumpcap) 3.6. Using Default and Custom Capture Filters 3.7. Filter by a Protocol, Address or Host Name 3.8. Advanced Capture Filters (Operators and Byte Offset Filtering) Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 2
4 4. Define Global and Personal Preferences for Faster Analysis 4.1. Set Global and Personal Configurations 4.2. Customize Your User Interface Settings 4.3. Define Your Capture Preferences 4.4. Define IP and MAC Name Resolution 4.5. Define ARP, TCP, HTTP/HTTPS and Other Protocol Settings 4.6. Use Colors to Distinguish Traffic 4.7. Marking Packets of Interest 5. Defined Time Values and Interpret Summaries 5.1. Use Time to Identify Network Issues 5.2. Create Additional Time Columns 6. Interpret Basic Trace File Statistics to Identify Trends 6.1. Launch Wireshark Statistics for Protocols and Applications 6.2. Identify the Most Active Conversations/Endpoints 6.3. List Endpoints and Map Them on the OpenStreetMap 6.4. List Conversations or Endpoints for Specific Traffic Types 6.5. List All UDP and TCP Ports Used 6.6. Graphic Flow of Traffic 6.7. Analyze HTTP Statistics 6.8. Analyze WLAN Statistics 7. Create and Apply Display Filters for Efficient Analysis 7.1. Create Display Filters Using Auto Complete 7.2. Create and Apply Saved Display Filters 7.3. Use Expressions for Filter System 7.4. Combine Display Filters with Comparison Operators 7.5. Alter Display Filter Meaning with Parentheses 7.6. Filter on Specific Bytes in a Packet 7.7. Avoid Common Display Filter Mistakes 7.8. Manually Edit the dfilters File DAY TWO 8. Follow Streams and Reassemble Data 8.1. Follow and Reassemble UDP and TCP Conversations 8.2. Identify Common File Types 8.3. Follow and Reassemble SSL Conversations Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 3
5 9. Use Wireshark's Expert System to Identify Anomalies 9.1. Launch Expert Info Quickly 9.2. Colorize Expert Info Elements 9.3. Filter on TCP Expert Information Elements 9.4. Define TCP Expert Information 10. TCP/IP Analysis Overview Define Basic TCP/IP Functionality Define the Multistep Resolution Process Define Port Number Resolution Define Network Name Resolution Define Route Resolution for a Local Target Define Local MAC Address Resolution for a Target Define Route Resolution for a Remote Target Define Local MAC Address Resolution for a Gateway 11. Analyze Common TCP/IP Traffic Patterns Analyze Normal/Unusual DNS Queries/Responses Analyze Normal/Unusual ARP Requests/Responses Analyze Gratuitous ARP Dissect the ARP Packet Structure Analyze Normal/Unusual IPv4 Traffic Set Your IP Protocol Preferences Analyze Normal/Unusual ICMP Traffic Dissect the ICMP Packet Structure Analyze Normal/Unusual UDP Traffic Analyzed Normal/Unusual TCP Communications Define the Establishment of TCP Connections Define How TCP-based Services Are Refused TCP Sequential Packet Tracking Define TCP Flow Control Analyze TCP Problems Set TCP Protocol Parameters Analyze Normal/Unusual DHCP Traffic Analyze Normal/Unusual HTTP Communications Filter on HTTP or HTTPS Traffic Export and Display HTTP Objects Graph HTTP Traffic Flows and Set HTTP Preferences Analyze HTTPS Communications Decrypt HTTPS Traffic Analyze Normal/Unusual FTP Communications Reassemble FTP Data Transfers Analyze Normal/Unusual Communications Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 4
6 DAY THREE 12. Graph I/O Rates and TCP Trends Generate Basic and Advanced I/O Graphs Filter I/O Graphs Graph Round Trip Time and Throughput Rates Interpret TCP Window Size Issues Interpret Packet Loss, Duplicate ACKs and Retransmissions (WLAN) Analysis Fundamentals Analyze Signal Strength and Interference Capture WLAN Traffic - Compare Monitor Mode and Promiscuous Mode Set up WLAN Decryption Prepend a Radiotap or PPI Header Compare Signal Strength and Signal-to-Noise Ratios Describe Traffic Basics Analyzed Normal Communications Filter on All WLAN Traffic Analyze Frame Control Types and Subtypes 14. Voice over IP (VoIP) Analysis Fundamentals Define VoIP Traffic Flows and Analyze VoIP Problems Examine SIP and RTP Traffic Play Back VoIP Calls Create a VoIP Profile and VoIP Filters DAY FOUR 15. Network Forensics Fundamentals Gather Packet Evidence Methods for Avoiding Detection Recognize Unusual Traffic Patterns Color Unusual Traffic Patterns Check out Complementary Forensic Tools 16. Detect Scanning and Discovery Processes Detect ARP Scans (aka ARP Sweeps) Detect Various Types of TCP Port Scans Detect UDP Port Scans Detect IP Protocol Scans Define Idle Scans Know Your ICMP Types and Codes Analyze Traceroute Path Discovery Detect Dynamic Router Discovery Define Application Mapping Processes Use Wireshark for Passive OS Fingerprinting Detect Active OS Fingerprinting Identify Spoofed Addresses and Scans Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 5
7 17. Analyze Suspect Traffic Describe What Is Suspect Traffic Identify Vulnerabilities in the TCP/IP Resolution Processes Identify Unacceptable Traffic Find Maliciously Malformed Packets Identify Invalid or Dark Destination Addresses Differentiate between Flooding or Standard Denial of Service Traffic Find Clear Text Passwords and Data Identify Phone Home Behavior Catch Unusual Protocols and Applications Locate Route Redirection That Uses ICMP Catch ARP Poisoning Catch IP Fragmentation and Overwriting Spot TCP Splicing Watch Other Unusual TCP Traffic Identify Password Cracking Attempts Know Where to Look: Signature Locations DAY FIVE 18. Use Command-Line Tools Use Wireshark.exe (Command-Line Launch) Capture Traffic with Tshark List Trace File Details with Capinfos Edit Trace Files with Editcap Merge Trace Files with Mergecap Convert Text with Text2pcap Capture Traffic with Dumpcap Course Wrap Up Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 6
8 Course Customization: Trace Files Courses can be customized based on the customer s requirements and trace files provided in a timely manner. The goal of the course is to teach students a more efficient analysis method for spotting the cause of performance problems using Wireshark s capabilities for capture and analysis. Using the customer s own trace files provide students with experience analyzing their own traffic. Some things to keep in mind when supplying trace files to use in your course: We must receive the files at least 30 days before the course in order to integrate them into the course. Trace files should be no larger than 50MB each. If you have larger trace files, we can provide instructions on how to split them into file sets or we can arrange a special upload area to accommodate larger files. Trace files should not be taken just by plugging into a switch and capturing. This would only allow us to see broadcast and multicast traffic. Consider running Wireshark on a client during the capture sequence. Provide us with the following information on each trace file submitted: o Method of capture (e.g., spanned a switch port) o Capture location (e.g., close to user x who complains of performance issues) o Key IP address/host names (e.g., UserX is ) o Any concerns you would like investigated in the trace files Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 7
9 Training Facility Requirements Onsite Instructor-Led Courses Ms. Chappell will need to project her laptop throughout the presentation. Appropriately-sized projection screens should be placed in the room to ensure full visibility of the projected screens. A single projection screen (minimum 12 height) is suggested for smaller audience sizes (less than 50 students); larger and additional projection screens are required for larger audiences. Inadequate screen visibility for attendees will have a serious negative affect on attendee performance and success. In larger venues (typically hosting over 50 attendees), a wireless microphone will be required. Note that wired microphones/stand microphones will not work as Ms. Chappell is typing on her keyboard and walking the room through much of the event. Whiteboards are suggested in smaller venues (hosting less than 50 attendees); they are not used in larger venues. Please notify Ms. Chappell if she will be joined by assistants for the hearing impaired. Ms. Chappell speaks very quickly and at least two interpreters are suggested for the event. Online Instructor-Led Courses There are three different options for student access to the Online Instructor-Led courses. Option 1: Conference Room/Projector/Speaker In this configuration all students are at a single facility. One computer is connected to the Internet and webinar service. That computer projects the lesson video while feeding audio to the audience via speakers. Note: In order for students to ask individual questions of the instructor, each student must be logged in to the online training system during the class. Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 8
10 Option 2: Two-Computers per Student; Headset Required In this configuration all students have two computers - One computer is connected to the Internet and webinar service. That computer projects the lesson video while feeding audio to the audience via headset. The second Computer is the Wireshark computer. This option may not work for long class hours as the headsets can become uncomfortable. Note: In order for students to ask individual questions of the instructor, each student must be logged in to the online training system during the class. Option 3: Single Computer per Student; Headset Required (Option Not Recommended) In this configuration all students have a single computer and headset. Students must toggle back and forth between Wireshark and the webinar. This is not an ideal situation, but it has been used before. This option may not work for long class hours as the headsets can become uncomfortable. Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 9
11 CREATE YOUR OWN CUSTOMIZED COURSE OUTLINE AT About the Instructor Laura Chappell is a highly-energetic speaker and author of numerous industry titles on network communications, analysis and security. Nicknamed Glenda, the Good Witch, Laura has presented to thousands of State, Federal and international law enforcement officers, judicial members, engineers, network administrators, technicians and developers. Ms. Chappell is a member of the High Technology Crime Investigation Association (HTCIA) and an Associate Member of the Institute for Electrical and Electronic Engineers (IEEE) since Ms. Chappell is also a member of the FBI s Infragard organization. Her blend of humor, personal experiences, energy and clarity have earned her a top spot as an industry speaker at Microsoft, Novell, Hewlett-Packard, High Technology Crime Investigation Association and US Court conferences. Ms. Chappell is the Founder of Chappell University ( whichh develops and delivers onsite and online training in the areas of network protocols, network forensics and network tools. In 2007, Ms. Chappell founded Wireshark University, an educational firm devoted to teaching the art of wiretapping/ /communications interception, network forensics, TCP/IP analysis and network troubleshooting. Laura s network analysis, troubleshooting and security training is available online through the All Access Pass at chappellu.com and through customized online/onsite analysis and training. Clients Ms. Chappell s client base is global and includes numerous Fortune 100, federal, state and local law enforcement agencies. United States Navy United States Arsenal United States Court of Appeals Hong Kong Police Department Apple Lockheed Martin Cisco Systems Salesforcee Netflix Dell, Inc. IBM Corporation Microsoft Corporation Sutherland Asbill & Brennan, LLP United Bank of Switzerland Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 10
12 Federal Home Loan Bank of San Francisco McAfee Corporation Qualcomm Incorporated Symantec Corporation Riverbed Technologies Naval Criminal Investigative Services (NCIS) Northern Indiana Power Company Microchip Technology, Inc. CapitalOne Financial Services City of Canberra (Australia) Macau Police Department Australian High Tech Crime Centre Fidelity National Information Services City of San Francisco and several unnamed Federal agencies Conferences Ms. Chappell is consistently a top-rated speaker at numerous industry and private conferences including: Microsoft TechEd US Microsoft TechEd Europe Microsoft TechReady (Internal Technical Conference) High Technology Crime Investigation International Conference IEEE Regional Conference (California) Novell BrainShare Conference Novell Advanced Technical Training Conference US Courts Technical Training Conference United States Secret Service Electronic Crimes Task Force Quarterly Meetings OpenSourceWorld/LinuxExpo US European Forensics Conference Publications Ms. Chappell has authored numerous industry titles. Wireshark Network Analysis: The Official Wireshark Network Analyst Study Guide (Chappell University) Wireshark Certified Network Analyst: Official Exam Prep Guide (Chappell University) Guide to TCP/IP (Pearson; co-author Ed Tittel) Introduction to Network Analysis (podbooks) Network Analysis Case Studies (podbooks) Introduction to Cisco Router Configuration (Cisco Press) Advanced Cisco Router Configuration (Cisco Press) Multiprotocol Internetworking (Novell Press) NetWare LAN Analysis: IPX/SPX (Novell Press) Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 11
13 Contact Information Coordinator: Brenda Cardinal Phone: Fax: Mail: 5339 Prospect Road, #343 San Jose, California USA Websites: - Chappell University - Online Training Portal - Wireshark University Network Traffic and Security Analysis Course Sample 5-Day Course Outline Copyright Chappell University Page 12
and Outline Coordinator: .com brenda@chappellu. University www..lcuportal2.com
Network Traf ffic and Security Ana alysiss Sample Coordinator: 5-Day Course Outline Brenda Cardinal [email protected] Phone: +1 408 378 7841 Fax: +1 408 378 7891 Mail: 5339 Prospect Road, #343 San
Get Certified on the World s Foremost Network Protocol Analyzer
Wireshark is downloaded over 500,000 per month on average Wireshark University Get Certified on the World s Foremost Network Protocol Analyzer Exam Version 102.1 (updated 07/02/2012) Welcome to Wireshark
Troubleshooting TCP/IP Networks with Wireshark
Troubleshooting TCP/IP Networks with Wireshark Eğitim Tipi ve Süresi: 5 Days VILT Troubleshooting TCP/IP Networks with Wireshark Learn to use Wireshark to troubleshoot TCP/IP networks while preparing for
Looking for Trouble: ICMP and IP Statistics to Watch
Looking for Trouble: ICMP and IP Statistics to Watch Laura Chappell, Senior Protocol Analyst Protocol Analysis Institute [[email protected]] www.packet-level.com www.podbooks.com HTCIA Member,
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
Introduction to Network Security Lab 1 - Wireshark
Introduction to Network Security Lab 1 - Wireshark Bridges To Computing 1 Introduction: In our last lecture we discussed the Internet the World Wide Web and the Protocols that are used to facilitate communication
Network Security. Network Packet Analysis
Network Security Network Packet Analysis Module 3 Keith A. Watson, CISSP, CISA IA Research Engineer, CERIAS [email protected] 1 Network Packet Analysis Definition: Examining network packets to determine
Course Title: Penetration Testing: Security Analysis
Course Title: Penetration Testing: Security Analysis Page 1 of 9 Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced
Lab Exercise 802.11. Objective. Requirements. Step 1: Fetch a Trace
Lab Exercise 802.11 Objective To explore the physical layer, link layer, and management functions of 802.11. It is widely used to wireless connect mobile devices to the Internet, and covered in 4.4 of
Transport and Network Layer
Transport and Network Layer 1 Introduction Responsible for moving messages from end-to-end in a network Closely tied together TCP/IP: most commonly used protocol o Used in Internet o Compatible with a
10 Key Things Your VoIP Firewall Should Do. When voice joins applications and data on your network
10 Key Things Your Firewall Should Do When voice joins applications and data on your network Table of Contents Making the Move to 3 10 Key Things 1 Security is More Than Physical 4 2 Priority Means Clarity
Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN
Virtual private network Network security protocols COMP347 2006 Len Hamey Instead of a dedicated data link Packets securely sent over a shared network Internet VPN Public internet Security protocol encrypts
Lab Exercise SSL/TLS. Objective. Requirements. Step 1: Capture a Trace
Lab Exercise SSL/TLS Objective To observe SSL/TLS (Secure Sockets Layer / Transport Layer Security) in action. SSL/TLS is used to secure TCP connections, and it is widely used as part of the secure web:
Lab VI Capturing and monitoring the network traffic
Lab VI Capturing and monitoring the network traffic 1. Goals To gain general knowledge about the network analyzers and to understand their utility To learn how to use network traffic analyzer tools (Wireshark)
Introduction to Wireshark Network Analysis
Introduction to Wireshark Network Analysis Page 2 of 24 Table of Contents INTRODUCTION 4 Overview 4 CAPTURING LIVE DATA 5 Preface 6 Capture Interfaces 6 Capture Options 6 Performing the Capture 8 ANALYZING
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led
Deploying Cisco Basic Wireless LANs WDBWL v1.1; 3 days, Instructor-led Course Description This 3-day instructor-led, hands-on course provides learners with skills and resources required to successfully
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM
DL TC72 Communication Protocols: HDLC, SDLC, X.25, Frame Relay, ATM Objectives: Base training of an engineer for the installation and maintenance of Digital Telecommunications and Internetworking systems.
Attack Lab: Attacks on TCP/IP Protocols
Laboratory for Computer Security Education 1 Attack Lab: Attacks on TCP/IP Protocols Copyright c 2006-2010 Wenliang Du, Syracuse University. The development of this document is funded by the National Science
Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network.
Course Name: TCP/IP Networking Course Overview: Learn the essential skills needed to set up, configure, support, and troubleshoot your TCP/IP-based network. TCP/IP is the globally accepted group of protocols
Procedure: You can find the problem sheet on Drive D: of the lab PCs. 1. IP address for this host computer 2. Subnet mask 3. Default gateway address
Objectives University of Jordan Faculty of Engineering & Technology Computer Engineering Department Computer Networks Laboratory 907528 Lab.4 Basic Network Operation and Troubleshooting 1. To become familiar
Network Simulation Traffic, Paths and Impairment
Network Simulation Traffic, Paths and Impairment Summary Network simulation software and hardware appliances can emulate networks and network hardware. Wide Area Network (WAN) emulation, by simulating
CompTIA Network+ (Exam N10-005)
CompTIA Network+ (Exam N10-005) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Lab 2. CS-335a. Fall 2012 Computer Science Department. Manolis Surligas [email protected]
Lab 2 CS-335a Fall 2012 Computer Science Department Manolis Surligas [email protected] 1 Summary At this lab we will cover: Basics of Transport Layer (TCP, UDP) Broadcast ARP DNS More Wireshark filters
Raritan Valley Community College Academic Course Outline. CISY 253 - Advanced Computer Networking
Raritan Valley Community College Academic Course Outline CISY 253 - Advanced Computer Networking I. Basic Course Information A. Course number and Title: CISY 253- Advanced Computer Networking (TCP/IP)
Avaya ExpertNet Lite Assessment Tool
IP Telephony Contact Centers Mobility Services WHITE PAPER Avaya ExpertNet Lite Assessment Tool April 2005 avaya.com Table of Contents Overview... 1 Network Impact... 2 Network Paths... 2 Path Generation...
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer
Lab 9.1.1 Organizing CCENT Objectives by OSI Layer Objectives Organize the CCENT objectives by which layer or layers they address. Background / Preparation In this lab, you associate the objectives of
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0
Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 COURSE OVERVIEW: Interconnecting Cisco Networking Devices, Part 1 (ICND1) v3.0 is a five-day, instructor-led training course that teaches learners
Troubleshooting Tips and Tricks
Troubleshooting Tips and Tricks for TCP/IP Networks June 16, 2011 Laura Chappell Founder Chappell University/Wireshark University [email protected] SHARKFEST 11 Stanford University June 13 16, 2011 The
Guideline for setting up a functional VPN
Guideline for setting up a functional VPN Why do I want a VPN? VPN by definition creates a private, trusted network across an untrusted medium. It allows you to connect offices and people from around the
Network Projector Operation Guide
Network Projector Operation Guide Table of contents Preparation...3 Connecting the projector with your computer...3 Wired connection... 3 Wireless connection (for selective models)... 4 QPresenter...7
How To Analyze Bacnet (Bacnet) On A Microsoft Computer (Barcnet) (Bcfnet) And Get A Better Understanding Of The Protocol (Bafnet) From A Microsatellite) (Malware)
The following article was published in ASHRAE Journal, November 2008. Copyright 2008 American Society of Heating, Refrigerating and Air- Conditioning Engineers, Inc. It is presented for educational purposes
Linux Network Security
Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols
IP Networking. Overview. Networks Impact Daily Life. IP Networking - Part 1. How Networks Impact Daily Life. How Networks Impact Daily Life
Overview Dipl.-Ing. Peter Schrotter Institute of Communication Networks and Satellite Communications Graz University of Technology, Austria Fundamentals of Communicating over the Network Application Layer
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa
TYLER JUNIOR COLLEGE School of Continuing Studies 1530 SSW Loop 323 Tyler, TX 75701 1.800.298.5226 www.tjc.edu/continuingstudies/mycaa Education & Training Plan CompTIA N+ Specialist Program Student Full
FortKnox Personal Firewall
FortKnox Personal Firewall User Manual Document version 1.4 EN ( 15. 9. 2009 ) Copyright (c) 2007-2009 NETGATE Technologies s.r.o. All rights reserved. This product uses compression library zlib Copyright
Network/Internet Forensic and Intrusion Log Analysis
Course Introduction Enterprises all over the globe are compromised remotely by malicious hackers each day. Credit card numbers, proprietary information, account usernames and passwords, and a wealth of
Voice over IP. Demonstration 1: VoIP Protocols. Network Environment
Voice over IP Demonstration 1: VoIP Protocols Network Environment We use two Windows workstations from the production network, both with OpenPhone application (figure 1). The OpenH.323 project has developed
1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet
Review questions 1 Data information is sent onto the network cable using which of the following? A Communication protocol B Data packet C Media access method D Packages 2 To which TCP/IP architecture layer
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence:
To ensure you successfully install Timico VoIP for Business you must follow the steps in sequence: Firewall Settings - you may need to check with your technical department Step 1 Install Hardware Step
Smart Tips. Enabling WAN Load Balancing. Key Features. Network Diagram. Overview. Featured Products. WAN Failover. Enabling WAN Load Balancing Page 1
Smart Tips Enabling WAN Load Balancing Overview Many small businesses today use broadband links such as DSL or Cable, favoring them over the traditional link such as T1/E1 or leased lines because of the
Configure A VoIP Network
Configure A VoIP Network Prof. Mr. Altaf. I. Darvadiya Electronics & Communication C.U.Shah College of Engg. & Tech. Wadhwan(363030), India e-mail: [email protected] Ms. Zarna M. Gohil Electronics & Communication
Review: Lecture 1 - Internet History
Review: Lecture 1 - Internet History late 60's ARPANET, NCP 1977 first internet 1980's The Internet collection of networks communicating using the TCP/IP protocols 1 Review: Lecture 1 - Administration
Solution of Exercise Sheet 5
Foundations of Cybersecurity (Winter 15/16) Prof. Dr. Michael Backes CISPA / Saarland University saarland university computer science Protocols = {????} Client Server IP Address =???? IP Address =????
Network Security: Workshop
Network Security: Workshop Protocol Analyzer Network analysis is the process of capturing network traffic and inspecting it closely to determine what is happening on the network decodes,, or dissects,,
TABLE OF CONTENTS NETWORK SECURITY 1...1
Network Security 1 This document is the exclusive property of Cisco Systems, Inc. Permission is granted to print and copy this document for non-commercial distribution and exclusive use by instructors
Network Security: Workshop. Dr. Anat Bremler-Barr. Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org
1.pcap - File download Network Security: Workshop Dr. Anat Bremler-Barr Assignment #2 Analyze dump files Solution Taken from www.chrissanders.org Downloading a file is a pretty basic function when described
Unix System Administration
Unix System Administration Chris Schenk Lecture 08 Tuesday Feb 13 CSCI 4113, Spring 2007 ARP Review Host A 128.138.202.50 00:0B:DB:A6:76:18 Host B 128.138.202.53 00:11:43:70:45:81 Switch Host C 128.138.202.71
SSVP SIP School VoIP Professional Certification
SSVP SIP School VoIP Professional Certification Exam Objectives The SSVP exam is designed to test your skills and knowledge on the basics of Networking and Voice over IP. Everything that you need to cover
Encapsulating Voice in IP Packets
Encapsulating Voice in IP Packets Major VoIP Protocols This topic defines the major VoIP protocols and matches them with the seven layers of the OSI model. Major VoIP Protocols 15 The major VoIP protocols
Detecting rogue systems
Product Guide Revision A McAfee Rogue System Detection 4.7.1 For use with epolicy Orchestrator 4.6.3-5.0.0 Software Detecting rogue systems Unprotected systems, referred to as rogue systems, are often
Advanced Internetworking
Hands-On TCP-IP / IPv6 / VoIP Course Description In this Hands-On 3-day course, gives a deeper understanding of internetworking and routed network protocols. The focus of the course is the design, operation,
Installing and Configuring Websense Content Gateway
Installing and Configuring Websense Content Gateway Websense Support Webinar - September 2009 web security data security email security Support Webinars 2009 Websense, Inc. All rights reserved. Webinar
Chapter 1 Personal Computer Hardware------------------------------------------------ 7 hours
Essential Curriculum Networking Essentials Total Hours: 244 Cisco Discovery 1: Networking for Home and Small Businesses 81.5 hours teaching time Chapter 1 Personal Computer Hardware------------------------------------------------
MINIMUM NETWORK REQUIREMENTS 1. REQUIREMENTS SUMMARY... 1
Table of Contents 1. REQUIREMENTS SUMMARY... 1 2. REQUIREMENTS DETAIL... 2 2.1 DHCP SERVER... 2 2.2 DNS SERVER... 2 2.3 FIREWALLS... 3 2.4 NETWORK ADDRESS TRANSLATION... 4 2.5 APPLICATION LAYER GATEWAY...
Firewalls. Ahmad Almulhem March 10, 2012
Firewalls Ahmad Almulhem March 10, 2012 1 Outline Firewalls The Need for Firewalls Firewall Characteristics Types of Firewalls Firewall Basing Firewall Configurations Firewall Policies and Anomalies 2
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding
Chapter 6 Configuring the SSL VPN Tunnel Client and Port Forwarding This chapter describes the configuration for the SSL VPN Tunnel Client and for Port Forwarding. When a remote user accesses the SSL VPN
Expert Reference Series of White Papers. Troubleshooting Slow Networks with Wireshark
Expert Reference Series of White Papers Troubleshooting Slow Networks with Wireshark 1-800-COURSES www.globalknowledge.com Troubleshooting Slow Networks with Wireshark Laura Chappell, Founder, Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark
Lab 8.3.2 Conducting a Network Capture with Wireshark Objectives Perform a network traffic capture with Wireshark to become familiar with the Wireshark interface and environment. Analyze traffic to a web
Cconducted at the Cisco facility and Miercom lab. Specific areas examined
Lab Testing Summary Report July 2009 Report 090708 Product Category: Unified Communications Vendor Tested: Key findings and conclusions: Cisco Unified Communications solution uses multilayered security
Overview. Summary of Key Findings. Tech Note PCI Wireless Guideline
Overview The following note covers information published in the PCI-DSS Wireless Guideline in July of 2009 by the PCI Wireless Special Interest Group Implementation Team and addresses version 1.2 of the
DMZ Network Visibility with Wireshark June 15, 2010
DMZ Network Visibility with Wireshark June 15, 2010 Ashok Desai Senior Network Specialist Intel Information Technology SHARKFEST 10 Stanford University June 14-17, 2010 Outline Presentation Objective DMZ
CTS2134 Introduction to Networking. Module 8.4 8.7 Network Security
CTS2134 Introduction to Networking Module 8.4 8.7 Network Security Switch Security: VLANs A virtual LAN (VLAN) is a logical grouping of computers based on a switch port. VLAN membership is configured by
Final for ECE374 05/06/13 Solution!!
1 Final for ECE374 05/06/13 Solution!! Instructions: Put your name and student number on each sheet of paper! The exam is closed book. You have 90 minutes to complete the exam. Be a smart exam taker -
ACHILLES CERTIFICATION. SIS Module SLS 1508
ACHILLES CERTIFICATION PUBLIC REPORT Final DeltaV Report SIS Module SLS 1508 Disclaimer Wurldtech Security Inc. retains the right to change information in this report without notice. Wurldtech Security
The OSI Model: Understanding the Seven Layers of Computer Networks
Expert Reference Series of White Papers The OSI Model: Understanding the Seven Layers of Computer Networks 1-800-COURSES www.globalknowledge.com The OSI Model: Understanding the Seven Layers of Computer
UIP1868P User Interface Guide
UIP1868P User Interface Guide (Firmware version 0.13.4 and later) V1.1 Monday, July 8, 2005 Table of Contents Opening the UIP1868P's Configuration Utility... 3 Connecting to Your Broadband Modem... 4 Setting
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper
Symantec Endpoint Protection 11.0 Network Threat Protection (Firewall) Overview and Best Practices White Paper Details: Introduction When computers in a private network connect to the Internet, they physically
Own your LAN with Arp Poison Routing
Own your LAN with Arp Poison Routing By: Rorik Koster April 17, 2006 Security is a popular buzzword heard every day throughout our American culture and possibly even more so in our global economy. From
cnds@napier Slide 1 Introduction cnds@napier 1 Lecture 6 (Network Layer)
Slide 1 Introduction In today s and next week s lecture we will cover two of the most important areas in networking and the Internet: IP and TCP. These cover the network and transport layer of the OSI
CiscoWorks Internetwork Performance Monitor 4.0
CiscoWorks Internetwork Performance Monitor 4.0 Product Overview The CiscoWorks Internetwork Performance Monitor (IPM) is a network response-time and availability troubleshooting application. Included
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00
Cisco Certified Network Associate (CCNA) 120 Hours / 12 Months / Self-Paced WIA Fee: $2035.00 This fee includes the following exams: Cisco Certified Network Associate (CCNA) 100-101 ICND1 and 200-101 ICND2
Packet Sniffing with Wireshark and Tcpdump
Packet Sniffing with Wireshark and Tcpdump Capturing, or sniffing, network traffic is invaluable for network administrators troubleshooting network problems, security engineers investigating network security
Computer Networks/DV2 Lab
Computer Networks/DV2 Lab Room: BB 219 Additional Information: http://www.fb9dv.uni-duisburg.de/ti/en/education/teaching/ss08/netlab Equipment for each group: - 1 Server computer (OS: Windows 2000 Advanced
CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with 128 Virtual STA Interfaces
1 of 8 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT522-128 LANforge WiFIRE Chromebook 802.11a/b/g/n WiFi Traffic Generator with
The Wireless Network Road Trip
The Wireless Network Road Trip The Association Process To begin, you need a network. This lecture uses the common logical topology seen in Figure 9-1. As you can see, multiple wireless clients are in
PC/Network Technician Certification Program: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications
: CompTIA A+, Microsoft MTA: OS Essentials, CWTS Wireless Certifications ZAPL- 007 CompTIA A+, Microsoft MTA: Windows OS Essentials, CWTS Wireless Certifications) Fee: $3,175 - Includes training, comprehensive
Features Overview Guide About new features in WhatsUp Gold v14
Features Overview Guide About new features in WhatsUp Gold v14 Contents New Features in Ipswitch WhatsUp Gold v14 Welcome to WhatsUp Gold v14!... 1 About the Welcome Center About the Quick Setup Assistant...
C-more Remote HMI App
Topic: CM630 C-more Remote HMI App SAFETY NOTICE: The C-more Remote HMI App allows the user to connect to remote C-more panels from Ethernet, Wi-Fi, or cellular network connections. The Remote user can
Basic Vulnerability Issues for SIP Security
Introduction Basic Vulnerability Issues for SIP Security By Mark Collier Chief Technology Officer SecureLogix Corporation [email protected] The Session Initiation Protocol (SIP) is the future
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required
CSET 4750 Computer Networks and Data Communications (4 semester credit hours) CSET Required IT Required Current Catalog Description: Computer network architectures and their application to industry needs.
CCT vs. CCENT Skill Set Comparison
Operation of IP Data Networks Recognize the purpose and functions of various network devices such as Routers, Switches, Bridges and Hubs Select the components required to meet a given network specification
Keywords: VoIP calls, packet extraction, packet analysis
Chapter 17 EXTRACTING EVIDENCE RELATED TO VoIP CALLS David Irwin and Jill Slay Abstract The Voice over Internet Protocol (VoIP) is designed for voice communications over IP networks. To use a VoIP service,
Troubleshooting Voice Over IP with WireShark
Hands-On Course Description Voice over IP is being widely implemented both within companies and across the Internet. The key problems with IP voice services are maintaining the quality of the voice service
CS2107 Introduction to Information and System Security (Slid. (Slide set 8)
Networks, the Internet Tool support CS2107 Introduction to Information and System Security (Slide set 8) National University of Singapore School of Computing July, 2015 CS2107 Introduction to Information
How To Learn Cisco Cisco Ios And Cisco Vlan
Interconnecting Cisco Networking Devices: Accelerated Course CCNAX v2.0; 5 Days, Instructor-led Course Description Interconnecting Cisco Networking Devices: Accelerated (CCNAX) v2.0 is a 60-hour instructor-led
CSE 4482 Computer Security Management: Assessment and Forensics. Protection Mechanisms: Firewalls
CSE 4482 Computer Security Management: Assessment and Forensics Protection Mechanisms: Firewalls Instructor: N. Vlajic, Fall 2013 Required reading: Management of Information Security (MIS), by Whitman
CT505-30 LANforge-FIRE VoIP Call Generator
1 of 11 Network Testing and Emulation Solutions http://www.candelatech.com [email protected] +1 360 380 1618 [PST, GMT -8] CT505-30 LANforge-FIRE VoIP Call Generator The CT505-30 supports SIP VOIP
Network Traffic Analysis
2013 Network Traffic Analysis Gerben Kleijn and Terence Nicholls 6/21/2013 Contents Introduction... 3 Lab 1 - Installing the Operating System (OS)... 3 Lab 2 Working with TCPDump... 4 Lab 3 - Installing
20-CS-6053-00X Network Security Spring, 2014. An Introduction To. Network Security. Week 1. January 7
20-CS-6053-00X Network Security Spring, 2014 An Introduction To Network Security Week 1 January 7 Attacks Criminal: fraud, scams, destruction; IP, ID, brand theft Privacy: surveillance, databases, traffic
CS5008: Internet Computing
CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is
Security Technology White Paper
Security Technology White Paper Issue 01 Date 2012-10-30 HUAWEI TECHNOLOGIES CO., LTD. 2012. All rights reserved. No part of this document may be reproduced or transmitted in any form or by any means without
SSVVP SIP School VVoIP Professional Certification
SSVVP SIP School VVoIP Professional Certification Exam Objectives The SSVVP exam is designed to test your skills and knowledge on the basics of Networking, Voice over IP and Video over IP. Everything that
Connect the Host to attach to Fast Ethernet switch port Fa0/2. Configure the host as shown in the topology diagram above.
Lab 1.2.2 Capturing and Analyzing Network Traffic Host Name IP Address Fa0/0 Subnet Mask IP Address S0/0/0 Subnet Mask Default Gateway RouterA 172.17.0.1 255.255.0.0 192.168.1.1 (DCE) 255.255.255.0 N/A
CCNA R&S: Introduction to Networks. Chapter 5: Ethernet
CCNA R&S: Introduction to Networks Chapter 5: Ethernet 5.0.1.1 Introduction The OSI physical layer provides the means to transport the bits that make up a data link layer frame across the network media.
CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK
1 Chapter 10 CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK Chapter 10: CONNECTING WINDOWS XP PROFESSIONAL TO A NETWORK 2 OVERVIEW Configure and troubleshoot the TCP/IP protocol Connect to a wireless
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address
Firewall Defaults, Public Server Rule, and Secondary WAN IP Address This quick start guide provides the firewall defaults and explains how to configure some basic firewall rules for the ProSafe Wireless-N
Securing end devices
Securing end devices Securing the network edge is already covered. Infrastructure devices in the LAN Workstations Servers IP phones Access points Storage area networking (SAN) devices. Endpoint Security
