Networking: EC Council Network Security Administrator NSA



Similar documents
CH ENSA EC-Council Network Security Administrator Detailed Course Outline

EC-Council Network Security Administrator (ENSA) Duration: 5 Days Method: Instructor-Led

Network Security Administrator

Security + Certification (ITSY 1076) Syllabus

Network Defense Specialist. Course Title: Network Defense Specialist: Securing and Troubleshooting Network Operating Systems

NETWORK SECURITY (W/LAB) Course Syllabus

Network Security Fundamentals

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

EC Council Certified Ethical Hacker V8

Network Security and Firewall 1

Table of Contents. Introduction. Audience. At Course Completion

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Securing Cisco Network Devices (SND)

[CEH]: Ethical Hacking and Countermeasures

Eleventh Hour Security+

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

CompTIA Security+ (Exam SY0-410)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

CRYPTUS DIPLOMA IN IT SECURITY

Introduction to Cyber Security / Information Security

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Implementing Cisco IOS Network Security v2.0 (IINS)

information security and its Describe what drives the need for information security.

BUY ONLINE FROM:

Hackers are here. Where are you?

CYBERTRON NETWORK SOLUTIONS

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

FBLA Cyber Security aligned with Common Core FBLA: Cyber Security RST RST RST RST WHST WHST

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

Joseph Migga Kizza. A Guide to Computer Network Security. 4) Springer

EC-Council Certified Security Analyst (ECSA)

CEH Version8 Course Outline

Network Access Security. Lesson 10

The following chart provides the breakdown of exam as to the weight of each section of the exam.

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

CS5008: Internet Computing

How To Pass A Credit Course At Florida State College At Jacksonville

Detailed Description about course module wise:

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Implementing and Administering Security in a Microsoft Windows Server 2003 Network

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

Industrial Network Security for SCADA, Automation, Process Control and PLC Systems. Contents. 1 An Introduction to Industrial Network Security 1

Security. TestOut Modules

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

ENSA Training - EC-Council Network Security Administrator

Security Technology: Firewalls and VPNs

Course Title: Penetration Testing: Security Analysis

Today s Topics. Protect - Detect - Respond A Security-First Strategy. HCCA Compliance Institute April 27, Concepts.

Developing Network Security Strategies

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

Chapter 1 The Principles of Auditing 1

CompTIA Network+ (Exam N10-005)

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

INFORMATION SECURITY TRAINING

Exam Questions SY0-401

The Information Security Problem

MOC 6435A Designing a Windows Server 2008 Network Infrastructure

Security. Contents. S Wireless Personal, Local, Metropolitan, and Wide Area Networks 1

Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Chapter 4: Security of the architecture, and lower layer security (network security) 1

Domain 6.0: Network Security

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON

Certified Ethical Hacker (CEH)

EC-COUNCIL NETWORK SECURITY ADMINISTRATOR (ENSA) TRAINING (SINGLE-USER, DVD-ROM)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Advanced Higher Computing. Computer Networks. Homework Sheets

Implementing Secured Converged Wide Area Networks (ISCW) Version 1.0

Malicious Network Traffic Analysis

Systems and Principles Unit Syllabus

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Network Security: A Practical Approach. Jan L. Harrington

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

Securing Networks with Cisco Routers and Switches 1.0 (SECURE)

CS Final Exam

INFORMATION SECURITY TRAINING CATALOG (2015)

Firewalls and VPNs. Principles of Information Security, 5th Edition 1

Overview. Firewall Security. Perimeter Security Devices. Routers

Introduction p. 2. Introduction to Information Security p. 1. Introduction

Network Security: 30 Questions Every Manager Should Ask. Author: Dr. Eric Cole Chief Security Strategist Secure Anchor Consulting

Link Layer and Network Layer Security for Wireless Networks

form approved June/2006 revised Page 1 of 7

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

NETASQ & PCI DSS. Is NETASQ compatible with PCI DSS? NG Firewall version 9

Gigabit SSL VPN Security Router

Chapter 1 Network Security

Microsoft. CompTIA Network+ Rapid Review. (Exam N10-005) Craig Zacker

A Decision Maker s Guide to Securing an IT Infrastructure

Transcription:

coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA program is designed to provide fundamental skills needed to analyse the internal and external security threats against your network, and to help you develop the correct security posture that will protect your organisation. Students will learn how to evaluate network and Internet security issues. They will design and implement successful security policies relevant to you. In addition, they will learn how to expose systems and network vulnerabilities and defend against them Why should you attend this course before Certified Ethical Hacker (C/EH) Although attending this course and passing the exam is not a prerequisite of C/EH training or subsequently taking the C/EH exam, it is highly recommended. The C/EH program looks at security in offensive mode, while the NSA program looks at network security in defensive mode, therefore they compliment each other and help build a complete picture of today's Information Security landscape Audience System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies Prerequisites Before attending this course delegates should have Comptia Network+ equivalent knowledge, however, it is not essential to have passed the Network+ exam Course Outline NSAv1 Curriculum consists of instructor-led training Module 1: Introduction to Network Security Network topology; Network Types and the OSI Model Module 2: Network Protocols Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP IP: Attacks and Countermeasures

TCP, UDP: Attacks and Countermeasures FTP, TFTP, TELNET, SMTP: Vulnerabilities Module 3: Security Policy What is Security Policy? What Defines a good security policy Security Policy Structure Developing and Implementing security policies Requirements of Effective Security Policy Module 4: Physical Security Physical Security Threats Locks and Keys TEMPEST Fire Safety: Fire Suppression, Gaseous Emission Systems Laptop Security: Physical Security Countermeasures Biometric Devices PC Security: Boot Access Module 5: Network Attacks Current Statistics Defining Terms: Threats, Attack and Exploit Classification of Hackers and Attacks Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow War Driving; War Chalking; War Flying Denial of Service (DOS) Attacks and Distributed DOS Module 6: Intrusion Detection System Characteristics of IDS Host based IDS Vs Network based IDS IDS Detection Methods; Types of Signatures Intrusion Prevention System IDS Vs IPS IPS Tool Module 7: Firewalls Handling threats and security tasks Protection against hacking Centralization and Documentation Multi-layer firewall protection Packet filtering and Stateful Packet Filtering Multi firewall DMZ Specialty firewalls and Reverse firewalls Module8: Packet Filtering and Proxy Servers

Network Address Translation Application layer gateway and Proxying Virtual Private Network and the Authentication process Module 9: Bastion Host and Honeypots Bastion Host Honeypots and Honeynet Module 10: Hardening Routers Internet work Operating Systems (IOS) Troubleshooting a router Hardening a Router Components of router security Router security: testing tools Module 11: Hardening Operating Systems Security Windows Security Objects And Permissions NTFS File System Permissions Active Directory Kerberos Authentication And Security IP Security Linux Module 12: Patch Management Red Hat Up2date Patch Management Utility Installation Steps Microsoft Patch Management Process and Windows Update Services Patch Management Tools: Qchain Patch Management Tool: Microsoft Baseline Security Analyzer Other Patch Management Tools Module 13: Application Security Securing Web Applications IPSec And SSL Security Writing Secure Code; Best Practices Remote Administration Security Module 14: Web Security Network Devices and Design Altering the Network Addresses Client Authorization and Secure Client Transmissions Portable Applications Malicious Code Detection Browser Security Settings Common Gateway Interface (CGI) Web Application Input Data Validation and Buffer Overflows

Module 15: E-Mail Security Components Of An Email E-mail protocols E-Mail Security Risks How to defend against E-Mail security risks Module 16: Encryption Firewalls Implementing Encryption Maintaining confidentiality Digital certificates Public and Private Keys (including PGP) Choosing the size of keys Analyzing popular encryption schemes including IPSEC Module 17: Virtual Private Networks VPN Tunneling Protocols PPTP and L2TP VPN Security Module 18: WLAN Wireless Network Types Antenna WLAN Standards BlueTooth And Ultra Wideband WEP Description Tool (Air Snort and WEPCrack) WLAN Security;WPA; TKIP; WTLS EAP Methods Advanced Encryption Standards (AES); DES; RSA Encryption RADIUS; Multifactor Authentication Mobile Security Through Certificates Certificate Management Through PKI Module 19: Creating Fault Tolerance Network Security: Fault Tolerance Why Create Fault Tolerance Planning For Fault Tolerance Reasons For System Failure Preventive Measures Module 20: Incident Response What Is an Incident Step by Step Procedure Managing Incidents What Is an Incident Response

Six Step Approach for Incident Handling (PICERF Methodology) Incident Response Team Module 21: Disaster Recovery and Planning What is a Disaster Recovery Disaster Recovery Planning Business Continuity Planning Process Disaster Prevention Module 22: Network Vulnerability Assessment Vulnerability Assessment Goals of vulnerability assessment Network vulnerability Assessment methodology: Selecting vulnerability assessment tools View training dates» Need more information? Why not call one of our professional training advisors on 0800 40 848 40 or email us at training@coursemonster.com The training course outline shown above is a standardised version representing all the dates available and may vary from the course you attend. You will be sent the supplier's course outline when you enquire about a specific date. CMI Basepoint Business Park Rivermead Drive Westlea Swindon SN5 7EX Telephone: 01793 251271 Facsimile: 01273 358455 E-mail:info@cm-i.co.uk Registered in England No 5484253