Hur föredrar du att bli kontaktad:

Defending the Perimeter from Cyber Attacks

KURSNIVå

Intermediate

Kursnummer

2010

Längd

4 dagar

PDF Lägg till på önskelista

Ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. In this training course, you learn how to define and implement security principles, install and customize secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.

Du får lära dig att

  • Fortify your network perimeter to provide an integrated defence
  • Prevent or mitigate the effects of network attacks with a firewall
  • Detect and respond to network attacks with Intrusion Detection and Prevention (IDP)
  • Design, instal, and configure secure Virtual Private Networks (VPNs)
  • Mitigate the impact of Denial-of-Service (DoS) attacks

Viktig information om kursen

Recommended Experience

Basic security knowledge at the level of:
  • Course 468, System and Network Security Introduction
  • Working knowledge of TCP/IP and client server architecture

GCHQ Certified Training and Exam Information

  • This is a GCHQ Certified Training (GCT) course. GCHQ Certified Training has been recognised for excellence by a UK Government developed cyber security scheme. GCT is part of the UK Government’s initiative to address the shortage of skilled cyber security professionals. The GCT scheme is underpinned by the industry respected IISP framework and assesses the quality of the course materials and the Instructors’ delivery of the course against GCHQ’s exacting standards.
  • Successful completion of the end of course exam will gain you an independent APMG-International GCT certification award and digital badge.

Kursinnehåll

  • Setting Your Security Objectives

Defining security principles

  • Ensuring data Confidentiality, Integrity and Availability (CIA)
  • Assessing defensive techniques
  • Setting a generic security stance

Developing a security policy

  • Balancing risk with business requirements
  • Identifying your information assurance objectives
  • Choosing security technologies
  • Deploying a Secure Firewall

Installing a firewall

  • Determining the appropriate firewall type
  • Selecting and hardening the operating system
  • Virtualising the firewall appliance

Configuring a firewall to support outgoing services

  • Supporting simple services: HTTP, SMTP
  • Filtering dangerous content and handling encrypted traffic
  • Managing complex services: VoIP, audio and video

Providing external services securely

  • Implementing publicly accessible servers
  • Building a DMZ architecture
  • Supporting SMTP mail

Allowing access to internal services

  • Customising DNS for firewall architectures
  • Configuring Network Address Translation (NAT)
  • Developing access lists for client server applications
  • Detecting and Preventing Intrusion

Deploying an IDS

  • Placing Network IDS (NIDS) within your network architecture
  • Operating sensors in stealth mode

Detecting intrusions in the enterprise

  • Designing a multi-layer IDS hierarchy
  • Managing distributed IDS

Interpreting alerts

  • Verifying IDS operation
  • Minimising false positives and negatives
  • Validating IDS events and recognising attacks

Stopping intruders

  • Exploiting IDS active responses
  • Snipping a TCP session
  • Controlling access with a firewall update
  • Configuring Remote User Virtual Private Networks (VPNs)

Building VPN tunnels

  • Compulsory vs. voluntary tunnels
  • Supporting remote users with layer 2 tunnels
  • Connecting remote sites with layer 3 tunnels

Deploying client software

  • Assessing remote access VPN alternatives
  • Implementing remote user authentication
  • Leveraging Layer 2 Tunneling Protocol (L2TP)
  • Protecting L2TP tunnels with IPsec Transport Mode
  • Creating Site-to-Site VPNs

Applying cryptographic protection

  • Ensuring confidentiality with symmetric encryption
  • Exchanging symmetric keys with asymmetric encryption
  • Checking message integrity with hashing
  • Managing digital certificates with PKI

Comparing tunnelling and protection methods

  • Employing VPN concentrators and VPN-capable routers
  • Applying IPsec Tunnel Mode
  • Assessing tunnelling protocols
  • Evaluating VPN topologies
  • Integrating Perimeter Defences

Reducing the impact of denial-of-service (DoS) attacks

  • Mitigating bombardment attacks
  • Rejecting connection-based attacks with IPSs
  • Blackholing and sinkholing
  • Implementing a DoS Defence System (DDS)
  • Blacklisting attack sites and address ranges

Perimeter architectures

  • Integrating IDS and VPNs with your firewall architecture
  • Positioning externally accessible servers
  • Monitoring and controlling wireless networks
Visa detaljerat kursinnehåll
Visa mindre

Alternativa sätt att delta på denna Lärarledda Kurs

Delta på denna lärarledda kurs i klassrummet eller online via AnyWare.

Smidig bokning: Du behöver inte betala kursen när du bokar, utan först 7 dagar efter kursstart.

I klassrum

Live, Online

Anpassad utbildning

I klassrum — ELLER — Live, Online

Pris — Ordinarie : 27950 SEK  

Kurser i Storbritannien, när du deltar online via AnyWare går kursen 10:00-17:30 CET (svensk tid)

3 - 6 dec ( 4 dagar)
9:00 - 4:30 GMT
London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

3 - 6 mar ( 4 dagar)
9:00 - 4:30 GMT
London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

9 - 12 jun ( 4 dagar)
9:00 - 4:30 BST
London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

18 - 21 aug ( 4 dagar)
9:00 - 4:30 BST
London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

Kurser i USA/Kanada, när du deltar online via AnyWare går kursen 15:00-22:30 CET (svensk tid)

4 - 7 feb ( 4 dagar)
9:00 - 4:30 EST
Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Boka Din Kursplats

25 - 28 feb ( 4 dagar)
9:00 - 4:30 EST
Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Boka Din Kursplats

4 - 7 aug ( 4 dagar)
9:00 - 4:30 EDT
Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Boka Din Kursplats

25 - 28 aug ( 4 dagar)
9:00 - 4:30 EDT
Ottawa / Online (AnyWare) Ottawa / Online (AnyWare) Boka Din Kursplats

Visa alla datum
Visa färre datum

Kurs med startgaranti

När du ser symbolen för “Guaranteed to Run” vid ett kurstillfälle vet du att kursen blir av. Garanterat.

Anpassad utbildning

Är ni ett team på 4 eller fler som behöver samma kurs? Ett alternativ är att genomföra den på plats hos er, utifrån era behov.

For details, call 08-506 668 00 or Click here »

This event has been added to your cart.

Pris

Ordinarie

I Klassrum eller
Online

Ordinarie

27950 SEK

Anpassad utbildning

Kontakta oss »

Kurspris inkluderar:

COACHNING AV LÄRAREN EFTER KURSEN
När du kommer tillbaka till jobbet kan du boka tid för kostnadsfri coachning för att få vägledning i hur du använder dina nya kunskaper i ditt dagliga arbete.

LEARNING TREES KUNSKAPSTEST
Learning Trees kunskapstest som erbjuds i slutet av kurserna ingår i kurspriset. För certifieringstest från tredje part (ex. ITIL) tillkommer en avgift.

Prev
Next

Kurstider

Kurstid:
09:00-16:30

Tid för frivilligt kunskapstest sista kursdagen:
15:30-16:30

Övrigt:
Efter varje kursdag finns det tid för samtal med instruktören gällande frågor som är extra intressanta för just dig.

- ,

Prev
Next

Please Choose a Language

Canada - English

Canada - Français