Defending the Perimeter from Cyber Attacks Training
Defending the Perimeter from Cyber Attacks Training
Course 2010
Duration: 4 days
Labs: Yes
Language: English
Level: Intermediate
This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. You will learn how to define and implement security principles, install and customise secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.
Basic security knowledge at the level of:
Course 468, System and Network Security Introduction
Working knowledge of TCP/IP and client server architecture
Defending the Perimeter from Cyber Attacks Training Delivery Methods
After-course instructor coaching benefit
Learning Tree end-of-course exam included
Defending the Perimeter from Cyber Attacks Training Course Benefits
Fortify your network perimeter to provide an integrated defencePrevent or mitigate the effects of network attacks with a firewallDetect and respond to network attacks with Intrusion Detection and Prevention (IDP)Design, install, and configure secure Virtual Private Networks (VPNs)Mitigate the impact of Denial-of-Service (DoS) attacks
Defending the Perimeter Course Outline
Defining security principles
Ensuring data Confidentiality, Integrity and Availability (CIA)
Assessing defensive techniques
Setting a generic security stance
Developing a security policy
Balancing risk with business requirements
Identifying your information assurance objectives
Choosing security technologies
Installing a firewall
Determining the appropriate firewall type
Selecting and hardening the operating system
Virtualising the firewall appliance
Configuring a firewall to support outgoing services
Supporting simple services: HTTP, SMTP
Filtering dangerous content and handling encrypted traffic
Managing complex services: VoIP, audio and video
Providing external services securely
Implementing publicly accessible servers
Building a DMZ architecture
Supporting SMTP mail
Allowing access to internal services
Customising DNS for firewall architectures
Configuring Network Address Translation (NAT)
Developing access lists for client server applications
Deploying an IDS
Placing Network IDS (NIDS) within your network architecture
Operating sensors in stealth mode
Detecting intrusions in the enterprise
Designing a multi-layer IDS hierarchy
Managing distributed IDS
Interpreting alerts
Verifying IDS operation
Minimising false positives and negatives
Validating IDS events and recognising attacks
Stopping intruders
Exploiting IDS active responses
Snipping a TCP session
Controlling access with a firewall update
Building VPN tunnels
Compulsory vs. voluntary tunnels
Supporting remote users with layer 2 tunnels
Connecting remote sites with layer 3 tunnels
Deploying client software
Assessing remote access VPN alternatives
Implementing remote user authentication
Leveraging Layer 2 Tunnelling Protocol (L2TP)
Protecting L2TP tunnels with IPsec Transport Mode
Applying cryptographic protection
Ensuring confidentiality with symmetric encryption
Exchanging symmetric keys with asymmetric encryption
Checking message integrity with hashing
Managing digital certificates with PKI
Comparing tunnelling and protection methods
Employing VPN concentrators and VPN-capable routers
Applying IPsec Tunnel Mode
Assessing tunnelling protocols
Evaluating VPN topologies
Reducing the impact of denial-of-service (DoS) attacks
Mitigating bombardment attacks
Rejecting connection-based attacks with IPSs
Blackholing and sinkholing
Implementing a DoS Defence System (DDS)
Blacklisting attack sites and address ranges
Perimeter architectures
Integrating IDS and VPNs with your firewall architecture
Positioning externally accessible servers
Monitoring and controlling wireless networks
Get This Course
32 130 kr
For Team Prices Call: +46 (0)8 506 668 00
4-day instructor-led training course
One-on-one after course instructor coaching
Earn 23 CompTIA CEUs
Pay later by invoice -OR- at the time of checkout by credit card
#2010
Guaranteed to Run - you can rest assured that the class will not be cancelled.
jul 15 - 1815:00 - 22:30 CEST
Online (AnyWare)
Använd denna eller någon annan utbildning i ditt företag
Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.