Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring Activity and Intrusion Detection... 3 Day 3... 4 5. Implementing and Maintaining a Secure Network... 4 6. Securing the Network and Environment... 4 Day 4... 5 7. Cryptography Basics, Methods, and Standards... 5 Day 5... 6 8. Security Policies and Procedures... 6 9. Security Administration... 7 Program počinje u 9h (osveženje) Pauza 10:30-11h (osveženje) Pauza za ručak 12:30-13:30h (sendvič) Pauza 15-15:30 (osveženje) 0
Day 1 1. General Security Concepts Understanding Information Security o Securing the Physical Environment o Examining Operational Security o Working with Management and Policies Understanding the Goals of Information Security Comprehending the Security Process o Appreciating Antivirus Software o Implementing Access Control o Understanding Authentication Authentication Issues to Consider Distinguishing between Security Topologies o Setting Design Goals o Creating Security Zones o Working with Newer Technologies o Addressing Business Concerns o Dealing with Telephony Issues 2. Identifying Potential Risks Calculating Attack Strategies o Understanding Access Attack Types o Recognizing Modification and Repudiation Attacks o Identifying Denial-of-Service and Distributed Denial-of-Service Attacks Recognizing Common Attacks o Back Door Attacks o Spoofing Attacks o Man-in-the-Middle Attacks o Replay Attacks o Password-Guessing Attacks o Privilege Escalation Identifying TCP/IP Security Concerns o Working with the TCP/IP Suite o Understanding Encapsulation o Working with Protocols and Services o Recognizing TCP/IP Attacks Understanding Software Exploitation Understanding OVAL 1
Surviving Malicious Code o Viruses o Trojan Horses o Logic Bombs o Worms o Antivirus Software Understanding Social Engineering Introducing Auditing Processes and Files Day 2 3. Infrastructure and Connectivity Understanding Infrastructure Security o Working with Hardware Components o Working with Software Components Understanding the Different Network Infrastructure Devices o Firewalls o Hubs o Modems o Remote Access Services o Routers o Switches o Telecom/PBX Systems o Virtual Private Networks o Wireless Access Points Monitoring and Diagnosing Networks o Network Monitors o Intrusion Detection Systems Securing Workstations and Servers Understanding Mobile Devices Understanding Remote Access o Using Point-to-Point Protocol o Working with Tunneling Protocols o Using 802.1x Wireless Protocols o Working with RADIUS o TACACS/+ Securing Internet Connections o Working with Ports and Sockets o Working with E-Mail 2
o o Working with the Web Working with File Transfer Protocol Understanding Network Protocols The Basics of Cabling, Wires, and Communications o Coax o Unshielded Twisted Pair and Shielded Twisted Pair o Fiber Optic o Infrared o Radio Frequencies o Microwave Systems Employing Removable Storage o CD-R/DVD-R o Diskettes o Flash Cards o Hard Drives o Network Attached Storage o Smart Cards o Tape o Thumb Drives 4. Monitoring Activity and Intrusion Detection Monitoring the Network o Recognizing the Different Types of Network Traffic o Monitoring Network Systems Understanding Intrusion Detection Systems o Working with a Network-Based IDS o Working with a Host-Based IDS o Working with NIPS o Utilizing Honeypots o Understanding Incident Response Working with Wireless Systems o Wireless Transport Layer Security o IEEE 802.11x Wireless Protocols o WEP/WAP o Wireless Vulnerabilities to Know Understanding Instant Messaging s Features o Understanding IM Vulnerabilities o Controlling Privacy Working with 8.3 File Naming Understanding Protocol Analyzers 3
Understanding Signal Analysis and Intelligence o Footprinting o Scanning Day 3 5. Implementing and Maintaining a Secure Network Overview of Network Security Threats Defining Security Baselines Hardening the OS and NOS o Configuring Network Protocols o Hardening Microsoft Windows Vista o Hardening Microsoft Windows XP o Hardening Windows Server 2003 o Hardening Microsoft Windows 2000 o Hardening Unix/Linux o Hardening Novell NetWare o Hardening Apple Macintosh o Hardening Filesystems o Updating Your Operating System Hardening Network Devices o Updating Network Devices o Configuring Routers and Firewalls Hardening Applications o Hardening Web Servers o Hardening E-Mail Servers o Hardening FTP Servers o Hardening DNS Servers o Hardening NNTP Servers o Hardening File and Print Servers and Services o Hardening DHCP Services o Working with Data Repositories 6. Securing the Network and Environment Understanding Physical and Network Security o Implementing Access Control o Understanding Social Engineering o Scanning the Environment 4
Understanding Business Continuity Planning o Undertaking Business Impact Analysis o Assessing Risk Developing Policies, Standards, and Guidelines o Implementing Policies o Incorporating Standards o Following Guidelines Working with Security Standards and ISO 17799 Classifying Information o Public Information o Private Information o Roles in the Security Process o Information Access Controls Day 4 7. Cryptography Basics, Methods, and Standards An Overview of Cryptography o Understanding Physical Cryptography o Understanding Mathematical Cryptography o Working with Passwords o Understanding Quantum Cryptography o Uncovering the Myth of Unbreakable Codes Understanding Cryptographic Algorithms o The Science of Hashing o Working with Symmetric Algorithms o Working with Asymmetric Algorithms Using Cryptographic Systems o Confidentiality o Integrity o Digital Signatures o Authentication o Nonrepudiation o Access Control Using Public Key Infrastructure o Using a Certificate Authority o Working with Registration Authorities and Local Registration Authorities o Implementing Certificates o Understanding Certificate Revocation 5
o Implementing Trust Models Preparing for Cryptographic Attacks Understanding Cryptography Standards and Protocols o The Origins of Encryption Standards o Public-Key Infrastructure X.509/Public-Key Cryptography Standards o X.509 o SSL and TLS o Certificate Management Protocols o Secure Multipurpose Internet Mail Extensions o Secure Electronic Transaction o Secure Shell o Pretty Good Privacy o HTTP Secure o Secure HTTP o IP Security o Tunneling Protocols o Federal Information Processing Standard o Common Criteria o Wireless Transport Layer Security o Wired Equivalent Privacy o ISO 17799 Understanding Key Management and the Key Life Cycle o Comparing Centralized and Decentralized Key Generation o Storing and Distributing Keys o Using Key Escrow o Identifying Key Expiration o Revoking Keys o Suspending Keys o Recovering and Archiving Keys o Renewing Keys o Destroying Keys o Identifying Key Usage Day 5 8. Security Policies and Procedures Understanding Business Continuity o Utilities o High Availability o Disaster Recovery 6
Reinforcing Vendor Support o Service-Level Agreements o Code Escrow Agreements Generating Policies and Procedures o Human Resource Policies o Business Policies o Certificate Policies o Incident-Response Policies Enforcing Privilege Management o User and Group Role Management o Privilege Escalation o Single Sign-On Initiatives o Privilege Decision Making o Auditing o Access Control 9. Security Administration Understanding Security Management o Drafting Best Practices and Documentation Simplifying Security Administration Understanding Security Awareness and Education o Using Communication and Awareness o Providing Education Staying on Top of Security o Websites o Trade Publications Regulating Privacy and Security o The Health Insurance Portability and Accountability Act o The Gramm-Leach-Bliley Act of 1999 o The Computer Fraud and Abuse Act o The Family Educational Rights and Privacy Act o The Computer Security Act of 1987 o The Cyberspace Electronic Security Act o The Cyber Security Enhancement Act o The Patriot Act o Familiarizing Yourself with International Efforts 7