Network Security Administrator



Similar documents
CH ENSA EC-Council Network Security Administrator Detailed Course Outline

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Networking: EC Council Network Security Administrator NSA

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

IT Networking and Security

ICANWK406A Install, configure and test network security

Chapter 1 The Principles of Auditing 1

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

NETWORK SECURITY (W/LAB) Course Syllabus

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Network Security: A Practical Approach. Jan L. Harrington

Developing Network Security Strategies

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Chapter 9 Firewalls and Intrusion Prevention Systems

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

CompTIA Network+ (Exam N10-005)

CNA 432/532 OSI Layers Security

Critical Controls for Cyber Security.

How To Pass A Credit Course At Florida State College At Jacksonville

IT Networking and Security

1. Cyber Security. White Paper Data Communication in Substation Automation System (SAS) Cyber security in substation communication network

United States Trustee Program s Wireless LAN Security Checklist

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Introduction to Cyber Security / Information Security

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Description: Objective: Attending students will learn:

State of New Mexico Statewide Architectural Configuration Requirements. Title: Network Security Standard S-STD Effective Date: April 7, 2005

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

VPN. Date: 4/15/2004 By: Heena Patel

State of Illinois Department of Central Management Services GENERAL SECURITY FOR STATEWIDE NETWORK RESOURCES POLICY

Network Security and Firewall 1

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

NOS for Network Support (903)

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

STRATEGIC POLICY. Information Security Policy Documentation. Network Management Policy. 1. Introduction

Security Design.

Computer Security: Principles and Practice

INFORMATION SECURITY TRAINING CATALOG (2015)

SANS Top 20 Critical Controls for Effective Cyber Defense

PROTECTING INFORMATION SYSTEMS WITH FIREWALLS: REVISED GUIDELINES ON FIREWALL TECHNOLOGIES AND POLICIES

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Computer Security DD2395

Microsoft Technologies

Network Security Guidelines. e-governance

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

"Charting the Course... Implementing Citrix NetScaler 11 for App and Desktop Solutions CNS-207 Course Summary

CNS-207 Implementing Citrix NetScaler 10.5 for App and Desktop Solutions

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Case Study for Layer 3 Authentication and Encryption

HANDBOOK 8 NETWORK SECURITY Version 1.0

LAMAR STATE COLLEGE - ORANGE INFORMATION RESOURCES SECURITY MANUAL. for INFORMATION RESOURCES

By David G. Holmberg, Ph.D., Member ASHRAE

Specialized Programme on Internetworking Design and LAN WAN Administration

Fundamentals of Network Security - Theory and Practice-

Overview - Using ADAMS With a Firewall

IT Architecture Review. ISACA Conference Fall 2003

SCADA SYSTEMS AND SECURITY WHITEPAPER

Security Policy JUNE 1, SalesNOW. Security Policy v v

Certified Information Systems Auditor (CISA)

Overview - Using ADAMS With a Firewall

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

MCSA Objectives. Exam : TS:Exchange Server 2007, Configuring

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

SCADA/Business Network Separation: Securing an Integrated SCADA System

A Rackspace White Paper Spring 2010

74% 96 Action Items. Compliance

Cisco Advanced Services for Network Security

H.I.P.A.A. Compliance Made Easy Products and Services

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

Local Area Networks (LANs) Blueprint (May 2012 Release)

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

INCIDENT RESPONSE CHECKLIST

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Section 12 MUST BE COMPLETED BY: 4/22

information security and its Describe what drives the need for information security.

Principles of Information Assurance Syllabus

INTERNET SECURITY: THE ROLE OF FIREWALL SYSTEM

Recommended IP Telephony Architecture

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Course Title: Penetration Testing: Security Analysis

Securing Modern Substations With an Open Standard Network Security Solution. Kevin Leech Schweitzer Engineering Laboratories, Inc.

CompTIA Security+ (Exam SY0-410)

HIPAA Security: Gap Analysis, Vulnerability Assessments, and Countermeasures

Transcription:

Network Security Administrator Course ID ECC600 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. Prerequisites There are no prerequisites for this course Audience System administrators, Network administrators and anyone who is interested in network security technologies. Duration Five Days

Course Content Fundamentals of Computer Network Key elements of network Nodes Logical Elements of Network Media Access Methods Automated Information Systems (AIS) Critical information characteristics Operations Security (OPSEC) Object reuse(computer security) Transmission Modes Network Topologies Network Protocols Application Layer Protocols Presentation Layer Protocol Session Layer Protocol Transport Layer Protocols Network Layer Protocols Data link Layer Protocol Hardening Physical Security Need for physical security Security Statistics Physical Security Breach Incidents Factors Affecting Physical Security Physical Security Threats Premises Security Electronic Physical Security Challenges in Ensuring Physical Security Mantrap Network Security Security awareness Functions of Network security administrator Communication Security (COMSEC) program or functional managers security office Transmission Security Legal Elements

Countermeasures: cover and deception Reporting security violations Security Standards Organizations Internet Corporation for Assigned Names and Numbers (ICANN) International Organization for Standardization (ISO) Consultative Committee For Telephone and Telegraphy (CCITT) International Telecommunication Union (ITU) American National Standards Institute(ANSI) Institute Of Electronics and Electrical Engineers(IEEE) Electronic Industries Association National Center for Standards and Certification Information (NIST) World Wide Web Consortium (W3C) Web Application Security Consortium (WASC) Security Standards Introduction to Internet Standards Standards Creation Committee Internet Standards Cabling Standards Specification Standards Security Policy Security Policy overview Concept of Security Policy Security Awareness Programs Vital role of a security policy Privacy and Confidentiality Security Levels Agency Specific AIS and Telecommunications Policies National Policy and Guidance Incident Handling and Escalation Procedures Security operations and life cycle management Compliance with Law and Policy Transborder encryption issues Points To Remember While Writing Security Policy Issue-specific Security Policy (ISSP) IEEE Standards Introduction to IEEE standards

IEEE LAN Protocol Specification Wireless Networking Standards Network Security Threats Vulnerability, Threats, and Attacks Common Vulnerabilities and Exposures Smurfing Hiding Evidence of an Attack Problems Detecting Network Attacks Network Scanning Tools Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) Intrusion Detection Concepts Deployment of IDS Types of Signatures True/False-Positive/Negative Intrusion Prevention System IDS vs. IPS Intrusion Detection Checklist Firewalls Security features Firewall Operations Establishing Rules and Restrictions for your Firewall Firewall Configuration Strategies Scalability Firewall Architecture Handling threats and security tasks Protection against hacking Multi-layer firewall protection Firewall deployment strategies Specialty firewalls and Reverse firewalls Advantages and Disadvantages Firewall Log Analysis Comparison of Various Firewall Products Packet Filtering and Proxy Servers Application layer gateway Proxy servers

Bastion Host and Honeypots Securing Modems Modem Features Modem Security Modem Attacks and Risks Modem Failure Symptoms Troubleshooting Modems Troubleshooting Network A Troubleshooting Methodology Troubleshooting Network Devices Troubleshooting Wireless Devices TCP/IP Troubleshooting Utilities Hardening Routers Routing Metrics Multiple Routing Routing Algorithms Internet work Operating Systems (IOS) IP Routing Configuring IP and IP routing Configuration of Routers Finger Tool Disabling the auxiliary and closing extra interfaces BOOTp service TCP and UDP small servers Hardening a Router Filtering Network Traffic Access Control List Log System Error Messages Securing Routers Router Commands Routing Table Maintenance Protocol (RTMP) Components of router security Hardening Operating Systems BIOS security Windows Registry Resource Access Discretionary Access Control List (DACL)

Encryption File System Windows Network Security Kerberos Authentication And Domain Security Windows Certificate Authorities Desktop Management Network Information Services Patch Management The Patch Concept Patch testing Patch Monitoring and Management Consolidating Patches on Red hat Network Red Hat Up2date Patch Management Reporting Patch Management Windows Update Services Log Analysis Limitations of log files Monitoring for Intrusion and Security Event Log Analysis Log Security Application Security Application Threats and Counter Measures Web Applications System Life Cycle Management Telecommunications Systems Securing Communications Transmission security countermeasures Embedded Application Security (EMBASSY) Secure Coding Threat modeling Web Security Common Threats on Web 2.1. Identity theft Identifying Unauthorized Devices Restrictive Access Network Addresses Tracking the Connectivity

Testing the Traffic Filtering Devices Client Authorization Input Data Validation Browser Security Plug-ins E-mail Security Web Based Versus POP3 E-mail Installing WorkgroupMail Configuring Outlook Express Secure Email E-Mail Security Risks Tools for E-mail Security Authentication: Encryption, Cryptography and Digital Signatures VeriSign Authentication Encryption Systems Cryptography Digital Signatures Key Management Protocols Virtual Private Networks and Remote Networking Tunneling VPN Security Wireless Network Security Wireless Technologies Wireless Communications Service Set IDentifier (SSID) Detecting Wireless Network Wireless Threats WLAN Management Wireless Auditing DHCP Services Trouble Shooting Wireless Network Creating Fault Tolerance Network Security Reasons for Network Failure

Reasons For System Failure Preventive Measures Incident Response Six Step Approach for Incident Handling (PICERF Methodology) Incident Response Team Disaster Recovery and Planning Backup Site Emergency Management Disaster Recovery Planning Security Planning Disaster Recovery Planning Team Business Process Inventory Risk Analysis Business Continuity Planning Process Emergency destruction procedures Disaster Prevention Network Vulnerability Assessment Vulnerability Assessment Personnel for Network Vulnerability Assessment Network vulnerability Assessment methodology