Fundamentals of Network Security - Theory and Practice-



Similar documents
Security + Certification (ITSY 1076) Syllabus

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Eleventh Hour Security+

How To Understand And Understand The Security Of A Key Infrastructure

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

IT Networking and Security

Network Security 網 路 安 全. Lecture 1 February 20, 2012 洪 國 寶

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

How To Pass A Credit Course At Florida State College At Jacksonville

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Content Teaching Academy at James Madison University

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Section 12 MUST BE COMPLETED BY: 4/22

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

CH ENSA EC-Council Network Security Administrator Detailed Course Outline

form approved June/2006 revised Page 1 of 7

ICANWK406A Install, configure and test network security

Security Controls for the Autodesk 360 Managed Services

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

DRAFT Standard Statement Encryption

OFFICE OF THE CONTROLLER OF CERTIFICATION AUTHORITIES TECHNICAL REQUIREMENTS FOR AUDIT OF CERTIFICATION AUTHORITIES

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

CTS2134 Introduction to Networking. Module Network Security

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

BUY ONLINE FROM:

Network Security Fundamentals

Network Security Administrator

CompTIA Security+ (Exam SY0-410)

Information Technology Career Cluster Advanced Cybersecurity Course Number:

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Security Goals Services

CCNA Security v1.0 Scope and Sequence

The Information Security Problem

Introduction to Cyber Security / Information Security

Cisco Advanced Services for Network Security

Core Syllabus. Version 2.6 C OPERATE KNOWLEDGE AREA: OPERATION AND SUPPORT OF INFORMATION SYSTEMS. June 2006

Network Access Security. Lesson 10

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

Basics of Internet Security

Cornerstones of Security

IT Networking and Security

E-Commerce Security. The Client-Side Vulnerabilities. Securing the Data Transaction LECTURE 7 (SECURITY)

IBX Business Network Platform Information Security Controls Document Classification [Public]

Network Security Bible Dr. Eric Cole, Dr. Ronald Krutz, and James W. Conley WILEY

INTRUSION DETECTION SYSTEMS and Network Security

MASTER OF SCIENCE IN INFORMATION ASSURANCE PROGRAM DEPARTMENT OF COMPUTER SCIENCE HAMPTON UNIVERSITY

CISCO IOS NETWORK SECURITY (IINS)

Central Agency for Information Technology

CompTIA Network+ (Exam N10-005)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CS 356 Lecture 19 and 20 Firewalls and Intrusion Prevention. Spring 2013

Ohio Supercomputer Center

Chapter 5. Data Communication And Internet Technology

Question Name C 1.1 Do all users and administrators have a unique ID and password? Yes

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Exhibit B5b South Dakota. Vendor Questions COTS Software Set

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Network Security: Introduction

information security and its Describe what drives the need for information security.

Designing a security policy to protect your automation solution

Securing Distribution Automation

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

CISA TIMETABLE (4 DAYS)

Diploma in Information Security Control, Audit and Management (CISSP Certification)

Information Security Policy

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Critical Controls for Cyber Security.

IT Security Standard: Network Device Configuration and Management

Summary of Technical Information Security for Information Systems and Services Managed by NUIT (Newcastle University IT Service)

NOS for Network Support (903)

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Honeywell Industrial Cyber Security Overview and Managed Industrial Cyber Security Services Honeywell Process Solutions (HPS) June 4, 2014

CCNA Security v1.0 Scope and Sequence

Local Area Networks (LANs) Blueprint (May 2012 Release)

SonicWALL PCI 1.1 Implementation Guide

Description: Objective: Attending students will learn:

Server Protection Policy 1 1. Rationale 1.1. Compliance with this policy will help protect the privacy and integrity of data created by and relating

CNA 432/532 OSI Layers Security

Threat Modeling. Frank Piessens ) KATHOLIEKE UNIVERSITEIT LEUVEN

Passing PCI Compliance How to Address the Application Security Mandates

THE BUSINESS CASE FOR NETWORK SECURITY: ADVOCACY, GOVERNANCE, AND ROI

AASTMT Acceptable Use Policy

Network Security Policy

Network Security Essentials:

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Network System Design Lesson Objectives

Bellevue University Cybersecurity Programs & Courses

Module II. Internet Security. Chapter 7. Intrusion Detection. Web Security: Theory & Applications. School of Software, Sun Yat-sen University

Guideline on Auditing and Log Management

Transcription:

Fundamentals of Network Security - Theory and Practice- Program: Day 1... 1 1. General Security Concepts... 1 2. Identifying Potential Risks... 1 Day 2... 2 3. Infrastructure and Connectivity... 2 4. Monitoring Activity and Intrusion Detection... 3 Day 3... 4 5. Implementing and Maintaining a Secure Network... 4 6. Securing the Network and Environment... 4 Day 4... 5 7. Cryptography Basics, Methods, and Standards... 5 Day 5... 6 8. Security Policies and Procedures... 6 9. Security Administration... 7 Program počinje u 9h (osveženje) Pauza 10:30-11h (osveženje) Pauza za ručak 12:30-13:30h (sendvič) Pauza 15-15:30 (osveženje) 0

Day 1 1. General Security Concepts Understanding Information Security o Securing the Physical Environment o Examining Operational Security o Working with Management and Policies Understanding the Goals of Information Security Comprehending the Security Process o Appreciating Antivirus Software o Implementing Access Control o Understanding Authentication Authentication Issues to Consider Distinguishing between Security Topologies o Setting Design Goals o Creating Security Zones o Working with Newer Technologies o Addressing Business Concerns o Dealing with Telephony Issues 2. Identifying Potential Risks Calculating Attack Strategies o Understanding Access Attack Types o Recognizing Modification and Repudiation Attacks o Identifying Denial-of-Service and Distributed Denial-of-Service Attacks Recognizing Common Attacks o Back Door Attacks o Spoofing Attacks o Man-in-the-Middle Attacks o Replay Attacks o Password-Guessing Attacks o Privilege Escalation Identifying TCP/IP Security Concerns o Working with the TCP/IP Suite o Understanding Encapsulation o Working with Protocols and Services o Recognizing TCP/IP Attacks Understanding Software Exploitation Understanding OVAL 1

Surviving Malicious Code o Viruses o Trojan Horses o Logic Bombs o Worms o Antivirus Software Understanding Social Engineering Introducing Auditing Processes and Files Day 2 3. Infrastructure and Connectivity Understanding Infrastructure Security o Working with Hardware Components o Working with Software Components Understanding the Different Network Infrastructure Devices o Firewalls o Hubs o Modems o Remote Access Services o Routers o Switches o Telecom/PBX Systems o Virtual Private Networks o Wireless Access Points Monitoring and Diagnosing Networks o Network Monitors o Intrusion Detection Systems Securing Workstations and Servers Understanding Mobile Devices Understanding Remote Access o Using Point-to-Point Protocol o Working with Tunneling Protocols o Using 802.1x Wireless Protocols o Working with RADIUS o TACACS/+ Securing Internet Connections o Working with Ports and Sockets o Working with E-Mail 2

o o Working with the Web Working with File Transfer Protocol Understanding Network Protocols The Basics of Cabling, Wires, and Communications o Coax o Unshielded Twisted Pair and Shielded Twisted Pair o Fiber Optic o Infrared o Radio Frequencies o Microwave Systems Employing Removable Storage o CD-R/DVD-R o Diskettes o Flash Cards o Hard Drives o Network Attached Storage o Smart Cards o Tape o Thumb Drives 4. Monitoring Activity and Intrusion Detection Monitoring the Network o Recognizing the Different Types of Network Traffic o Monitoring Network Systems Understanding Intrusion Detection Systems o Working with a Network-Based IDS o Working with a Host-Based IDS o Working with NIPS o Utilizing Honeypots o Understanding Incident Response Working with Wireless Systems o Wireless Transport Layer Security o IEEE 802.11x Wireless Protocols o WEP/WAP o Wireless Vulnerabilities to Know Understanding Instant Messaging s Features o Understanding IM Vulnerabilities o Controlling Privacy Working with 8.3 File Naming Understanding Protocol Analyzers 3

Understanding Signal Analysis and Intelligence o Footprinting o Scanning Day 3 5. Implementing and Maintaining a Secure Network Overview of Network Security Threats Defining Security Baselines Hardening the OS and NOS o Configuring Network Protocols o Hardening Microsoft Windows Vista o Hardening Microsoft Windows XP o Hardening Windows Server 2003 o Hardening Microsoft Windows 2000 o Hardening Unix/Linux o Hardening Novell NetWare o Hardening Apple Macintosh o Hardening Filesystems o Updating Your Operating System Hardening Network Devices o Updating Network Devices o Configuring Routers and Firewalls Hardening Applications o Hardening Web Servers o Hardening E-Mail Servers o Hardening FTP Servers o Hardening DNS Servers o Hardening NNTP Servers o Hardening File and Print Servers and Services o Hardening DHCP Services o Working with Data Repositories 6. Securing the Network and Environment Understanding Physical and Network Security o Implementing Access Control o Understanding Social Engineering o Scanning the Environment 4

Understanding Business Continuity Planning o Undertaking Business Impact Analysis o Assessing Risk Developing Policies, Standards, and Guidelines o Implementing Policies o Incorporating Standards o Following Guidelines Working with Security Standards and ISO 17799 Classifying Information o Public Information o Private Information o Roles in the Security Process o Information Access Controls Day 4 7. Cryptography Basics, Methods, and Standards An Overview of Cryptography o Understanding Physical Cryptography o Understanding Mathematical Cryptography o Working with Passwords o Understanding Quantum Cryptography o Uncovering the Myth of Unbreakable Codes Understanding Cryptographic Algorithms o The Science of Hashing o Working with Symmetric Algorithms o Working with Asymmetric Algorithms Using Cryptographic Systems o Confidentiality o Integrity o Digital Signatures o Authentication o Nonrepudiation o Access Control Using Public Key Infrastructure o Using a Certificate Authority o Working with Registration Authorities and Local Registration Authorities o Implementing Certificates o Understanding Certificate Revocation 5

o Implementing Trust Models Preparing for Cryptographic Attacks Understanding Cryptography Standards and Protocols o The Origins of Encryption Standards o Public-Key Infrastructure X.509/Public-Key Cryptography Standards o X.509 o SSL and TLS o Certificate Management Protocols o Secure Multipurpose Internet Mail Extensions o Secure Electronic Transaction o Secure Shell o Pretty Good Privacy o HTTP Secure o Secure HTTP o IP Security o Tunneling Protocols o Federal Information Processing Standard o Common Criteria o Wireless Transport Layer Security o Wired Equivalent Privacy o ISO 17799 Understanding Key Management and the Key Life Cycle o Comparing Centralized and Decentralized Key Generation o Storing and Distributing Keys o Using Key Escrow o Identifying Key Expiration o Revoking Keys o Suspending Keys o Recovering and Archiving Keys o Renewing Keys o Destroying Keys o Identifying Key Usage Day 5 8. Security Policies and Procedures Understanding Business Continuity o Utilities o High Availability o Disaster Recovery 6

Reinforcing Vendor Support o Service-Level Agreements o Code Escrow Agreements Generating Policies and Procedures o Human Resource Policies o Business Policies o Certificate Policies o Incident-Response Policies Enforcing Privilege Management o User and Group Role Management o Privilege Escalation o Single Sign-On Initiatives o Privilege Decision Making o Auditing o Access Control 9. Security Administration Understanding Security Management o Drafting Best Practices and Documentation Simplifying Security Administration Understanding Security Awareness and Education o Using Communication and Awareness o Providing Education Staying on Top of Security o Websites o Trade Publications Regulating Privacy and Security o The Health Insurance Portability and Accountability Act o The Gramm-Leach-Bliley Act of 1999 o The Computer Fraud and Abuse Act o The Family Educational Rights and Privacy Act o The Computer Security Act of 1987 o The Cyberspace Electronic Security Act o The Cyber Security Enhancement Act o The Patriot Act o Familiarizing Yourself with International Efforts 7