Download Interent ExplorerDownload Apple SafariDownload OperaDownload FirefoxDownload Google Chrome

Assessing and Securing the Perimeter Training

Assessing and Securing the Perimeter Training

Assessing and Securing the Perimeter Training:

Assessing and Securing the Perimeter Training Course (Online, Onsite, and Classroom Live!)

Intensive Hands-on Assessing and Securing the Perimeter Training. Today’s network perimeter is no longer a single boundary that is easily definable. This makes defending the perimeter a very difficult task, which requires an information security professional to know a diverse set of technologies and applications.

What’s Included?

  • 5 days of Assessing and Securing the Perimeter Training with an expert instructor
  • Assessing and Securing the Perimeter Electronic Course Guide
  • Certificate of Completion
  • 100% Satisfaction Guarantee


Related Courses

Customize It:

  • If you are familiar with some aspects of Assessing and Securing the Perimeter Training, we can omit or shorten their discussion.
  • We can adjust the emphasis placed on the various topics or build the Assessing and Securing the Perimeter Training course around the mix of technologies of interest to you (including technologies other than those included in this outline).
  • If your background is nontechnical, we can exclude the more technical topics, include the topics that may be of special interest to you (e.g., as a manager or policy-maker), and present the Assessing and Securing the Perimeter Training course in a manner understandable to lay audiences.

Course Outline:

Day 1 – TCP/IP Weapons School and Defenses

  • Packet Investigation Tools
  • Wireshark
  • dsniff
  • OSI Layer 2 Attacks and Defenses
  • Address Resolution Protocol (ARP)
  • ARP spoofing
  • Session Hijacking
  • OSI Layer 3 Attacks and Defenses
  • IP Header Fields
  • Packet Fragmentation
  • Covert Channels
  • OSI Layer 4 & 5 Attacks and Defenses
  • TCP & UDP Headers
  • TCP Sequence Numbers
  • Port Scanning Prevention
  • ICMP Traffic Control
  • IPv6 Attacks and Defenses
  • IPv6 Headers and Addressing
  • IPv6 Attacks
    SLAAC Attacks

Day 2 – Firewall and Router Defenses

  • Secure DMZ Design
  • Network Address Translation
  • NAT Security Concerns
  • Packet Filtering
  • Vulnerability of packet filtering devices
  • Stateful Inspection
  • Stateful Inspection Security Considerations
  • Border & Gateway Routers
  • Border Router Filtering Best Practices
  • Proxy Devices
  • Proxy Settings and Security
  • Enterprise Firewall Rule Management
  • Top 10 Most Common Cisco router attacks and defenses

Day 3 – Security Event Monitoring and Detection

  • Intrusion Detection and Prevention
  • How to write IDS Rules
  • Detecting Attacks
  • Network abuse signatures
  • Attack Signatures
  • Advanced Attack Signatures
  • Remote exploit command Shell signatures
  • Network mapping with NMAP
  • Identifying and responding to DDoS attacks
  • False Positive Analysis
  • False Negative Analysis
  • Security Device Log Analysis
  • Antivirus Log Analysis
  • Unified Threat Management
  • SIM Architecture
  • NTP settings
  • Firewall log detection

Day 4 – Operating System Security and Remote Access Security

  • Virtual Private Network (VPN) Security
  • IPSEC Overview
  • SSL VPNs
  • VPN design considerations
  • Wireless Security
  • WEP, WPA, WPA2
  • 802.1x Security
  • Network Access Control
  • NAC vs. Cisco NAC
  • Securing Servers
  • Patching
  • Password Security
  • Policy Management
  • Automated hardening tools / scripts
  • Securing DNS
  • Securing Web Servers
  • Securing SMTP
  • Vulnerability Assessment

Day 5 – Securing Web Applications and Client Security

  • Client Attacks
  • Spearphishing
  • Attacking and Defending Microsoft Office
  • Attacking and Defending Internet Browsers
  • OWASP Top 10 Application Security Risks
  • Cross-Site Scripting
  • Directory Traversal
  • Web Application
  • Vulnerability Scanners

Whether you are looking for general information or have a specific question, we want to help!

Request More Information

    Time frame: