EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led



Similar documents
CH ENSA EC-Council Network Security Administrator Detailed Course Outline

Network Security Administrator

Networking: EC Council Network Security Administrator NSA

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems

CompTIA Network+ (Exam N10-005)

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

IT Networking and Security

Developing Network Security Strategies

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Critical Controls for Cyber Security.

NETWORK SECURITY (W/LAB) Course Syllabus

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design

VPN. Date: 4/15/2004 By: Heena Patel

Fundamentals of Network Security - Theory and Practice-

JOB READY ASSESSMENT BLUEPRINT COMPUTER NETWORKING FUNDAMENTALS - PILOT. Test Code: 4514 Version: 01

Chapter 1 The Principles of Auditing 1

ICANWK406A Install, configure and test network security

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

IT Networking and Security

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Course Title: Penetration Testing: Security Analysis

Implementing Cisco IOS Network Security

Securing Cisco Network Devices (SND)

167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College

Network Security: A Practical Approach. Jan L. Harrington

United States Trustee Program s Wireless LAN Security Checklist

Security + Certification (ITSY 1076) Syllabus

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Network Access Security. Lesson 10

Chapter 1 Personal Computer Hardware hours

Basics of Internet Security

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Lab Organizing CCENT Objectives by OSI Layer

How To Pass A Credit Course At Florida State College At Jacksonville

INFORMATION SECURITY TRAINING CATALOG (2015)

Network Security and Firewall 1

NOS for Network Support (903)

Principles of Information Assurance Syllabus

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Implementing Cisco IOS Network Security v2.0 (IINS)

CNA 432/532 OSI Layers Security

Specialized Programme on Internetworking Design and LAN WAN Administration

Eleventh Hour Security+

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Certified Information Systems Auditor (CISA)

Microsoft Technologies

CompTIA Security+ (Exam SY0-410)

Course Syllabus. Fundamentals of Windows Server 2008 Network and Applications Infrastructure. Key Data. Audience. Prerequisites. At Course Completion

Potential Security Vulnerabilities of a Wireless Network. Implementation in a Military Healthcare Environment. Jason Meyer. East Carolina University

CYBERTRON NETWORK SOLUTIONS

Course Description and Outline. IT Essential II: Network Operating Systems V2.0

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College

Chapter 9 Firewalls and Intrusion Prevention Systems

Linux Network Security

information security and its Describe what drives the need for information security.

A radical approach to secure LAN network using novel hardening techniques

A host-based firewall can be used in addition to a network-based firewall to provide multiple layers of protection.

DATA SECURITY 1/12. Copyright Nokia Corporation All rights reserved. Ver. 1.0

INFORMATION TECHNOLOGY MANAGEMENT COMMITTEE LIVINGSTON, NJ ITMC TECH TIP ROB COONCE, MARCH 2008

CUSTOMIZED ASSESSMENT BLUEPRINT COMPUTER SYSTEMS NETWORKING PA. Test Code: 8148 Version: 01

Advanced Higher Computing. Computer Networks. Homework Sheets

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Company Co. Inc. LLC. LAN Domain Network Security Best Practices. An integrated approach to securing Company Co. Inc.


CTS2134 Introduction to Networking. Module Network Security

Network System Design Lesson Objectives

Associate in Science Degree in Computer Network Systems Engineering

Information Security. Training

CCT vs. CCENT Skill Set Comparison

Wireless Security Overview. Ann Geyer Partner, Tunitas Group Chair, Mobile Healthcare Alliance

MCSA Security + Certification Program

MCSE Objectives. Exam : TS:Exchange Server 2007, Configuring

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Cisco Advanced Services for Network Security

CISCO IOS NETWORK SECURITY (IINS)

Security Controls What Works. Southside Virginia Community College: Security Awareness

Prerequisites: Fundamentals of Networking, Knowledge of Operating Systems

Detailed Description about course module wise:

IINS Implementing Cisco Network Security 3.0 (IINS)

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

Exam 1 - CSIS 3755 Information Assurance

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Firewalls. Securing Networks. Chapter 3 Part 1 of 4 CA M S Mehta, FCA

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Diploma in Network (LAN/WAN) Administration

Medical Networks and Operating Systems

Introduction to Cyber Security / Information Security

Design and Implementation Guide. Apple iphone Compatibility

Case Study for Layer 3 Authentication and Encryption

Transcription:

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led Certification: ENSA Exam 312-38 Course Description This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. Target Audience System administrators, Network administrators and anyone who is interested in network security technologies. Course Outline Key Elements of Network Logical Elements of Network Types of Network Media Media Access Methods Critical Information Characteristics Information States Operations Security (OPSEC) Introduction To Protocols Implementing Network Protocols Application Layer Protocols Presentation Layer Protocol Overview of TCP/IP Relation To Other Protocol TCP/IP Protocol Suite Windowing 01. Fundamentals of Computer Network 02. Network Protocols 03. Protocol Analysis Object Reuse(Computer Security) OSI Model Transmission Modes Logical Network Classification Network Topologies Physical Network Classification Network Equipments Session Layer Protocol Transport Layer Protocols Network Layer Protocols Data Link Layer Protocol Sliding Window Acknowledgement TCP IP

Need for Physical Security Security Statistics Physical Security Breach Incidents Factors Affecting Physical Security Physical Security Threats Overview of Network Security The Need for Network Security The Goals of Network Security Security Awareness Functions of Network Security Administrator Communication Security (COMSEC) Functions of INFOSEC Officer Functions of Information Resources Management Staff Program or Functional Managers Security Office Internet Corporation for Assigned Names and Numbers (ICANN) International Organization for Standardization (ISO) Consultative Committee for Telephone and Telegraphy (CCITT) International Telecommunication Union (ITU) American National Standards Institute(ANSI) Introduction to Internet Standards Standards Creation Committee Internet Standards RFC Evolution Types and Submissions Obtaining RFCs Security Policy Overview Concept of Security Policy Key Security Elements Security Awareness Programs Vital Role of a Security Policy Classification of Security Policy Contents of Security Policy Privacy and Confidentiality Security Levels Agency Specific AIS and Telecommunications Policies Configuration of Security Policy 04. Hardening Physical Security 05. Network Security 06. Security Standards Organizations 07. Security Standards 08. Security Policy Premises Security EPS (Electronic Physical Security) Challenges in Ensuring Physical Security Mantrap Physical Security Checklist Senior Management System Manager and System Staff Telecommunications Office and Staff Functions of Audit Office Functions of OPSEC Managers Role of End Users Network Security At Transmission Security Legal Elements Countermeasures: Cover and Deception Reporting Security Violations Institute of Electronics and Electrical Engineers(IEEE) Electronic Industries Association National Center for Standards and Certification Information (NIST) World Wide Web Consortium (W3C) Web Application Security Consortium (WASC) Cabling Standards EIA/TIA -568 UTP Categories Cable Specifications Electronic Industries Association National Policy and Guidance Implementation of Security Policy Incident Handling and Escalation Procedures Security Operations and Life Cycle Management Defining Responses to Security Violations Presenting and Reviewing the Process Compliance with Law and Policy Transborder Encryption Issues Points to Remember While Writing Security Policy Issue-Specific Security Policy (ISSP) Creating and Managing ISSPs

Introduction to IEEE standards IEEE LAN Protocol Specification Current Statistics Types of Attackers Classification of Hackers Techniques Common Vulnerabilities and Exposures (CVE) 09. IEEE Standards 10. Network Security Threats Wireless Networking Standards Attacks Hiding Evidence of an Attack Problems Detecting Network Attacks Network Scanning Tools 11. Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS) Introduction to IDS History of Intrusion Detection Intrusion Detection Concepts IDS for an Organization Characteristics of IDS Aggregate Analysis with IDS Types of IDS Deployment of IDS Types of Signatures Firewalls: Introduction Security Features Multiple components of Firewall Firewall Operations Software Firewall Hardware Firewall Types of Firewalls Pix Firewall Basic Features of PIX Firewall Advanced Features of PIX Firewall Firewall Features Establishing Rules and Restrictions for your Firewall Firewall Configuration Strategies Scalability Firewall Architecture Handling Threats and Security Tasks Protection Bastion Hosts Against Hacking Centralization Honeypot and Documentation 12. Firewalls True/False-Positive/Negative Major Methods of Operation IDS Tool Intrusion Prevention System Information Flow in IDS and IPS IPS Tool IDS vs. IPS Intrusion Detection Checklist Multi-Layer Firewall Protection Firewall Deployment Strategies Specialty Firewalls and Reverse Firewalls Advantages of Using Firewalls Disadvantages of Using Firewalls Threats Limitations of Firewalls Personal Firewall Software Personal Firewall Hardware Firewall Log Analysis Firewall Tools Comparison of Various Firewall Products T-REX Open Source Firewall SQUID WinGate Symantec Enterprise Firewall Firewall Testers Honeynet 13. Packet Filtering and Proxy Servers Application Layer Gateway Proxy Servers Introduction to Modems Origin of Modems Modem Features Types of Modems Modem Security 14. Bastion Host and Honeypots 15. Securing Modems Categorizing Modem Access Modem Attacks Modem Risks Modem Failure Symptoms Troubleshooting Modems

Introduction to Troubleshooting A Troubleshooting Methodology Troubleshooting Network Devices Troubleshooting Network Slowdowns Introduction to Routers Routing Metrics Multiple Routing Types of Routers Routing Algorithms Internet work Operating Systems (IOS) IOS: FEATURES Routing Principles Modes of Operation IP Routing IP Source Routing Configuration of Routers Router Configuration Modes Finger Tool Disabling The Auxiliary and Closing Extra Interfaces BOOTp Service TCP and UDP Small Servers BIOS Security Windows Registry Configuring Windows Services Resource Access Discretionary Access Control List (DACL) Objects and Permissions Rights vs Permissions NTFS File System Permissions Encryption File System Windows Network Security Modes of Operation (Describes the security conditions under which the system actually functions) AIS Windows Infrastructure Features Kerberos Authentication and Domain Security 16. Troubleshooting Network 17. Hardening Routers 18. Hardening Operating Systems Troubleshooting Wireless Devices Troubleshooting Methodology TCP/IP Troubleshooting Utilities Disabling Proxy ARP Disabling SNMP Disabling NTP Hardening a Router Cisco Discovery Protocol Filtering Network Traffic Access Control List Log System Error Messages Securing Routers: Committed Access Rate Securing Routers: Secure Shell Router Commands Types of Routing Routing Protocols Routing Table Maintenance Protocol (RTMP) Troubleshooting a Router Components of Router Security Router Security: Testing Tools Trust Relationships Between Domains IP Security Windows Security Tools Windows Windows Certificate Authorities Certificate Authority Requirements Desktop Management File Management Linux Pluggable Authentication Module Network Information Services Group Management Utilities Permission Management Tools System Logger Utility Unix Security Macintosh Security Vista Security

Introduction The Patch Concept Patch Testing Patch Monitoring and Management Consolidating Patches on Red Hat Network Red Hat Up2date Patch Management: Utility Installation Steps Introduction to Log Analysis Overview of Log Analysis Audit Events Log Files Limitations of Log Files Importance of Application Security Why Is Web Security So Difficult? Application Threats and Counter Measures Application Dependent Guidance Web Applications System Life Cycle Management Telecommunications Systems Securing Voice Communications Overview of Web Security Common Threats on Web Identifying Unauthorized Devices Restrictive Access Network Addresses Tracking the Connectivity: Tracert/Traceroute Testing the Traffic Filtering Devices IIS Server Overview of E-Mail History of E-Mail Basics of E-Mail Types of E-Mail Web Based Versus POP3 E-Mail Components of an E-Mail E-Mail Servers E-Mail Encryption Installing WorkgroupMail 19. Patch Management 20. Log Analysis 21. Application Security 22. Web Security 23. E-Mail Security Red Hat Up2date Patch Management: Command Line Interface Reporting Patch Management Process Windows Update Services Microsoft Patch Management Tool: Microsoft Baseline Security Analyzer Patch Management Tool Monitoring for Intrusion and Security Event Log Analysis Tools How to Secure Logs (Log Security) Inc Setting Up of Servers: IIS & Apache Securing Data Communications Securing of Keying Material Transmission security countermeasures (e.g. Callsigns, Frequency, and Pattern Forewarning Protection) Embedded Application Security (EMBASSY) Secure Coding Threat Modeling Client Authorization Client-Side Data Server-Side Data Client Authentication Input Data Validation Browsing Analysis Browser Security Plug-ins Common Gateway Interface(CGI) Configuring Outlook Express Secure E-Mail E-Mail Authentication E-Mail Protocols Client and Server Architecture E-Mail Security Risks How to defend against E-Mail Security Risks Tools for E-Mail Security Tracking E-Mails

24. Authentication: Encryption, Cryptography and Digital Signatures Authentication VeriSign Authentication Encryption Cryptography Digital Certificates Certificate Encryption Process Public and Private Keys Digital Signatures Key Management Protocols (Bundling, Electronic Key, Over-The-Air Rekeying) 25. Virtual Private Networks and Remote Networking Introduction to Virtual Private Network Types of VPN Tunneling Fundamentals of Tunneling Tunneling Protocol Point to Point Tunneling Protocol (PPTP) Layer 2 Tunnel Protocol VPN Security Connection to VPN Step1: Setting Up VPN Step2: Implement DHCP Services Step3: Create an Enterprise Certificate Authority Step 4: Install IAS Step 5: Configure IAS Introduction to Wireless Types of Wireless Networks Components of Wireless Network Wireless Technologies Wireless Communications: Examples Devices Using Wireless Communications Service Set IDentifier (SSID) Detecting Wireless Network Types of Wireless Attacks Wireless Threats Overview of Wi-Fi Open Wi-Fi Vulnerabilities WLANs in Public Space Network Security: Fault Tolerance Why Create Fault Tolerance Network Security What is an Incident Category of Incident Types of Incident Step by Step Procedure What is an Incident Response? Six Step Approach for Incident Handling (PICERF Methodology) 26. Wireless Network Security 27. Creating Fault Tolerance 28. Incident Response Step 6: Create A Remote Access Policy Step 7: Configure The VPN Server Step 8: Associate The VPN Server with The DHCP Server Step 9: Configure Remote Clients Step 10: Test The Client Connection VPN Policies VPN Registrations and Passwords Risk Associated with VPN Pre Implementation Review Auditing Implementation Review Auditing Post Implementation Review and Reporting VPN Product Testing Common VPN Flaws Wired Equivalent Privacy WAP Wireless Network Attack Tool: AirSnarf Tools to Detect MAC Address Spoofing: Wellenreiter v2 WLAN Management Wireless Security Wireless Auditing DHCP Services Mobile Security Through Certificates Certificate Management Through PKI Trouble Shooting Wireless Network Wireless Network Security Checklist Reasons for Network Failure Reasons for System Failure Preventive Measures Incident Response Team Obstacles in Building a Successful Incident Response Team Computer Security Incident Response Team

Overview of Disaster and Its Types What is a Disaster Recovery? Principles of Disaster Recovery Types of Disaster Recovery Systems Backup Site Recovery of Small and Large Computer Systems Emergency Management Disaster Recovery Planning Security Planning Process of Disaster Recovery Plan Disaster Recovery Testing Contingency Planning/Disaster Recovery Contingency Plan Components, Agency Response Procedures and Continuity of Operations Team Member Responsibilities in Responding to an Emergency Situation 29. Disaster Recovery and Planning 30. Network Vulnerability Assessment Vulnerability Assessment Features of a Good Vulnerability Assessment Vulnerability Classes Choice of Personnel for Network Vulnerability Assessment Guidelines for Determining Critical and Essential Workload Determination of Backup Requirements Development of Procedures for Off-Site Processing Development of Plans for Recovery Actions After a Disruptive Event Emergency Destruction Procedures Disaster Recovery Planning Team Business Process Inventory Risk Analysis Risk Management Business Continuity Planning Process Emergency Destruction Procedures Six Myths About Business Continuity Management and Disaster Recovery Disaster Prevention Network Vulnerability Assessment Methodology How to Assess Vulnerability Assessment Tools? Selecting Vulnerability Assessment Tools