EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 614 Advanced Network Defense. Make The Difference CAST. EC-Council



Similar documents
External Supplier Control Requirements

NETWORK SECURITY (W/LAB) Course Syllabus

INFORMATION SECURITY TRAINING CATALOG (2015)

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 616 Securing Windows Infrastructure. Make The Difference CAST.

Where every interaction matters.

ETHICAL HACKING APPLICATIO WIRELESS110 00NETWORK APPLICATION MOBILE MOBILE0001

CompTIA Security+ (Exam SY0-410)

What s Wrong with Information Security Today? You are looking in the wrong places for the wrong things.

Reducing Application Vulnerabilities by Security Engineering

IINS Implementing Cisco Network Security 3.0 (IINS)

The Security Organization p. 1 Anecdote p. 2. Introduction

Developing Network Security Strategies

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

Implementing Cisco IOS Network Security

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

CORE Security and the Payment Card Industry Data Security Standard (PCI DSS)

Design and Implementation Guide. Apple iphone Compatibility

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Network Security Administrator

Protecting Your Organisation from Targeted Cyber Intrusion

STRATEGIC WHITE PAPER. Securing cloud environments with Nuage Networks VSP: Policy-based security automation and microsegmentation overview

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

SANS Top 20 Critical Controls for Effective Cyber Defense

REPORT ON AUDIT OF LOCAL AREA NETWORK OF C-STAR LAB

Building A Secure Microsoft Exchange Continuity Appliance

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

The self-defending network a resilient network. By Steen Pedersen Ementor, Denmark

Bypassing Network Access Control Systems

Application Security Testing

Microsoft Windows Server 2008: MS-6435 Designing Network and Applications Infrastructure MCITP 6435

CAST Center for Advanced Security Training

Networking: EC Council Network Security Administrator NSA

Architecture Overview

Web application security Executive brief Managing a growing threat: an executive s guide to Web application security.

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Certified Ethical Hacker Exam Version Comparison. Version Comparison

How To Prevent Hacker Attacks With Network Behavior Analysis

BUILDING AN OFFENSIVE SECURITY PROGRAM BUILDING AN OFFENSIVE SECURITY PROGRAM

Complete Web Application Security. Phase1-Building Web Application Security into Your Development Process

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

We are Passionate about Total Security Management Architecture & Infrastructure Optimisation Review

IBM. Vulnerability scanning and best practices

Chapter 1 The Principles of Auditing 1

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

Check Point and Security Best Practices. December 2013 Presented by David Rawle

FIREWALLS & CBAC. philip.heimer@hh.se

Redhawk Network Security, LLC Layton Ave., Suite One, Bend, OR

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Presented by Evan Sylvester, CISSP

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Rational AppScan & Ounce Products

SECURITY. Risk & Compliance Services

CONTINUOUS DIAGNOSTICS BEGINS WITH REDSEAL

Microsoft Systems Architecture 2.0 (MSA 2.0) Security Review An analysis by Foundstone, Inc.

Unlock the full potential of data centre virtualisation with micro-segmentation. Making software-defined security (SDS) work for your data centre

Analyzing Security for Retailers An analysis of what retailers can do to improve their network security

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

CMPT 471 Networking II

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Cloud Security:Threats & Mitgations

Enterprise Cybersecurity: Building an Effective Defense

MS-55096: Securing Data on Microsoft SQL Server 2012

How To Classify A Dnet Attack

CRYPTUS DIPLOMA IN IT SECURITY

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

U. S. Attorney Office Northern District of Texas March 2013

CyberNEXS Global Services

Best Practices for Outdoor Wireless Security

Cisco Security Optimization Service

Top Five Data Security Trends Impacting Franchise Operators. Payment System Risk September 29, 2009

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Security. TestOut Modules

HEC Security & Compliance

THE ROLE OF IDS & ADS IN NETWORK SECURITY

Microsoft Technologies

Designing a Windows Server 2008 Network Infrastructure

The Cyber Threat Profiler

90% of data breaches are caused by software vulnerabilities.

Securing end devices

Securing Web Applications...at the Network Layer

KASPERSKY SECURITY INTELLIGENCE SERVICES. EXPERT SERVICES.

Sitefinity Security and Best Practices

Secure networks are crucial for IT systems and their

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

The Risks that Pen Tests don t Find. OWASP 13 April The OWASP Foundation

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD SEGURIDAD EN REDES. NIVEL I. VERSION 2.0

Module 1: Overview of Network Infrastructure Design This module describes the key components of network infrastructure design.

Securing Data on Microsoft SQL Server 2012

Securing Cisco Network Devices (SND)

Critical Controls for Cyber Security.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

Transcription:

CENTER FOR ADVANCED SECURITY TRAINING 614 Advanced Network Defense Make The Difference

About Center of Advanced Security Training () The rapidly evolving information security landscape now requires professionals to stay up to date on the latest security technologies, threats and remediation strategies. was created to address the need for quality advanced technical training for information security professionals who aspire to acquire the skill sets required for their job functions. courses are advanced and highly technical training programs co-developed by and well-respected industry practitioners or subject matter experts. aims to provide specialized training programs that will cover key information security domains, at an advanced level.

Advanced Network Defense Course Description With this course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skillfully orchestrate robust and solid defenses and reinvent popular belief by beating the hacker at his own game. You will be evaluating advanced hacks and methods of defense fortification bringing you closer to establishing perfect security by reviewing best practices and methodologies you can apply to secure environments, provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat. The course will cover fundamental areas of fortifying your defenses; you will discover methods of developing a secure baseline and how to harden your enterprise architectures from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of live memory analysis and real time monitoring.

Key features of On-site: Each of the courses selected from the Advanced Training Suite will be specifically designed to meet the needs of each individual, based according to their current skills and pace of learning to meet your organisation s unique objectives and goals On-site expert/trainers will be flown down to your premise of choice at a date most suitable to you On-site allows students to receive training in more manageable sessions arranged over a spread of a few days that allowing for greater absorption of knowledge with an opportunity to practice and verify the new skills after each session prior to commencing the next one With On-site Advanced Security courses students will be able to take advantage of directly conversing with the chosen expert in matters unique to the student and your organisation You can be rest assured that all challenges and objectives pertaining to your organisation s goals can be discussed in an environment that ensures complete confidentiality Each individual client receives the required high level of training that is benchmarked to international best practise and standards Each student receives a Advanced Security Training Courseware that allows them to follow and revise the material that has been taught to them Upon completion of the course, each student will receive a On-Site Advanced Security Training certificate of attendance

How will this course benefit you? 01 Executing a set of techniques that are critical to the protection of your entire enterprise against some of today s most advanced threats 02 Reviewing methods of system deployments in as secure a state as possible while supporting your daily business requirements 03 Applying necessary techniques required for malware identification throughout the enterprise even in the case of the malware not being detectable by any of your security controls 04 Staging Advanced Attacks to appreciate methods of correctly eliminating or mitigating risk to an acceptable level

Who Should Attend Firewall administrators, system architects, system administrators, windows admin or those responsible for or interested in: Identifying security weaknesses in computer systems or networks Exposing weaknesses for system s owners to fix breaches before being targets of compromise Applying hacking and pen testing constructively to defend against various possible attacks Analysing best practices in developing secure system and network configurations Establishing a secure baseline in deploying machines in a protected state Appreciating popular attack methods applied by hackers in order to fortify their systems

From practically any organization that handles important data would find this course beneficial, examples are: Government agencies Universities Hospitality Retail Banking and Financial institutions Brokerage and Trading firms Insurance Scientific institutions & research agencies Telecommunication Computer design firms Consulting firms Science and Engineering firms Those involved with online related businesses & transactions Card related businesses

Course Outline 01. Firewalls Firewalls Firewall Types: Stateless Packet Filters Improving Device Remote-Access Security Locking Down the Console Port Protecting Terminal Lines Establishing Encrypted Communications Configuring HTTPS Configuring SSH LAB: Securing the Perimeter 02. Advanced Filtering Advanced Filtering Techniques Ingress Filtering Egress Filtering Source Address Verification (SAV) urpf Additional Filtering Considerations Time-Based ACLs Reflexive ACLs Reflexive ACL vs. Static ACL Context-Based Access Control (CBAC) Essential Steps to Harden Routers LAB: Advanced Filtering

03. Firewall Configuration 04. Hardening: Establishing a Advanced Filtering Techniques Secure Baseline Firewall Types: Stateful Packet Filters Application Proxies Application Proxies vs. Stateful Packet filters Web Application Firewalls Web Application Firewall Types Web Application Firewall Products Firewall Architecture Screened Subnet Firewall The Classic Firewall Architecture Belt and Braces Firewall Separate Services Subnet Fortress Mentality De-parameterization Perimeter Configuration Windows NT/2000/2003 and XP Windows 2000/2003/XP Windows 2003 Windows Vista Server 2003 Architecture Broken Kernel Modes of the OS UNIX/Linux Secure Server Guidelines Hardening Systems Security Compliance Manager Device Security Essential Steps to Harden Switches LAB: Hardening Lab: Selecting a Firewall Architecture

Windows Server 2008 Security (Part I) Server 2008 Components Enterprise Protection AD RMS AD RMS Components EFS EFS Enhancements in Server 2008 EFS Best Practices LAB: Server 2008 Lab Windows Server 2008 Security (Part II) IPsec Rules Firewall Scripting netsh Isolating a Server Group Policy Object Server Isolation Steps Domain Isolation Domain Isolation Issues Best Practices Trusted Platform Module Wave Systems TPM Architecture Crypto API Example Embassy Server Software Embassy Client Software Self-Encrypting Drives LAB: TPM

05. Intrusion Detection and Prevention Why Intrusion Detection? Windows NT/2000/2003 and XP Fortress Mentality Intrusion Detection 101 What is Intrusion Detection? False positives! Topology concerns Recommended in most circles Realistic Intrusion Prevention Types of IPS Host-Based Intrusion Prevention Systems Host-Based Intrusion Prevention Systems LAB: Intrusion Detection

06. Protecting Web Applications Windows NT/2000/2003 and XP Top 10 www.owasp.org Injection Flaws Cross Site Scripting Broken Authentication Insecure Cryptographic Storage Reverse Engineering Web Apps Tools Hackbar Tamper Data The Two Main Attacks for Web XSS SQL Injection xp_cmdshell There is More More Tools SQL Inject Me XSS ME Choose The Right Database Practice, Practice, Practice Tutorials Mutillidae Web Application Firewalls Components of Web Application Firewall LAB: Protecting Web Apps

07. Memory Analysis 08. Endpoint protection Data Types Revisited Volatile System date and time Current network connections and Open ports Processes that opened ports Cached NetBIOS Names Users Currently Logged On Internal routing Running Processes Pslist Trivia Pslist t Tasklist Tlist Running Services Open Files Process Memory Dumps LAB: Memory Analysis Introduction to NAC NAC Defined NAC General Architecture NAC General Architecture Illustrated NAC Concepts Inline NAC Out-of-Band Identifying NAC Requirements Implementing User-Based Identity Access Control Network Access Protection (NAP) NAP Components NAP Enforcement NAP Best Practices 802.1x EAP Explained LAB 1: Network Access Protection with DHCP LAB 2: Network Access Protection with IPsec LAB 3: Endpoint Protection

09. Securing Wireless ireless Tools Wireless Vulnerabilities Summary MAC Filtering Hiding Access Points Hijacking Jamming Identifying Targets Wardriving Sniffing on Wireless Attacking Encrypted Networks Wep Data The other case Reality WPA Tools WPA LEAP Asleap Comparison

TRAINERS PROFILE: Kevin Cardwell Kevin Cardwell served as the leader of a 5 person Red Team that achieved a 100% success rate at compromising systems and networks for six straight years. He has conducted over 500 security assessments across the globe. His expertise is in finding weaknesses and determining ways clients can mitigate or limit the impact of these weaknesses. He currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US, Middle East, Africa, Asia and the UK. He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is the author of the Center for Advanced Security and Training () Advanced Network Defense course. He is technical editor of the Learning Tree Course Penetration Testing Techniques and Computer Forensics. He has presented at the Blackhat USA, Hacker Halted, ISSA and TakeDownCon conferences. He has chaired the Cybercrime and Cyberdefense Summit in Oman. He is author of Bactrack: Testing Wireless Network Security. He holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman that recently was rated as the top CERT for the Middle East. he serves as a professional training consultant to the Oman Information Technology Authority, and developed the team to man the first Commercial Security Operations Center in the country of Oman. He has worked extensively with banks and financial institutions throughout the Middle East, Europe and the UK in the planning of a robust and secure architecture and implementing requirements to meet compliance. He currently provides consultancy to Commercial companies, governments, major banks and financial institutions in the Gulf region to include the Muscat Securities Market (MSM) and the Central Bank of Oman. Additionally, he provides training and consultancy to the Oman CERT and the SOC team in the monitoring and incident identification of intrusions and incidents within the Gulf region.