Defending the Perimeter from Cyber Attacks

Nivå: Intermediate
Snittbetyg: 4,7/5 4,72/5 Based on 53 Reviews

This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. You will learn how to define and implement security principles, install and customise secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.

Nyckelfunktioner:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

Du kommer lära dig att:

  • Fortify your network perimeter to provide an integrated defence
  • Prevent or mitigate the effects of network attacks with a firewall
  • Detect and respond to network attacks with Intrusion Detection and Prevention (IDP)
  • Design, install, and configure secure Virtual Private Networks (VPNs)
  • Mitigate the impact of Denial-of-Service (DoS) attacks

Välj den utbildningsform som passar dig bäst

LIVE, LÄRARLEDD

Klassrum och självstudier

  • 4-day instructor-led training course
  • One-on-one after course instructor coaching
  • Earn 23 CompTIA CEUs
  • Pay later by invoice -OR- at the time of checkout by credit card

FÖRETAGSINTERN UTBILDNING

Teamträning

  • Använd denna eller någon annan utbildning i ditt företag
  • Fullskalig programutveckling
  • Levereras när, var och hur du vill
  • Blandade utbildningsmodellerSkräddarsytt innehåll
  • Coaching av ett expertteam

Anpassa kurs och innehåll efter teamets behov

Kontakta oss

Utveckla dig och ditt team med anpassade eller öppna kurser alternativt e-learning

Learning Tree erbjuder kundanpassad utbildning hos er, öppna kurser i Stockholm, London eller Washington, möjlighet att delta via våra Anywhere centers (Malmö, Göteborg, Linköping, Stockholm eller Borlänge) eller olika former av e-learning med lärarstöd. Läs mer på www.learningtree.se/priser .

Klassrum och självstudier

Note: This course runs for 4 dagar *

*Events with the Partial Day Event clock icon run longer than normal but provide the convenience of half-day sessions.

  • 15 - 18 sep 9:00 - 4:30 BST London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

  • 1 - 4 dec 9:00 - 4:30 GMT London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

  • 23 - 26 mar 9:00 - 4:30 GMT London / Online (AnyWare) London / Online (AnyWare) Boka Din Kursplats

  • 4 - 7 aug 9:00 - 4:30 EDT Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Boka Din Kursplats

  • 10 - 13 nov 9:00 - 4:30 EST Alexandria, VA / Online (AnyWare) Alexandria, VA / Online (AnyWare) Boka Din Kursplats

  • 19 - 22 jan 9:00 - 4:30 EST Herndon, VA / Online (AnyWare) Herndon, VA / Online (AnyWare) Boka Din Kursplats

Kurs med startgaranti

När du ser symbolen för “Guaranteed to Run” vid ett kurstillfälle vet du att kursen blir av. Garanterat.

Partial Day Event

Learning Tree offers a flexible schedule program. If you cannot attend full day sessions, this option consists of four-hour sessions per day instead of the full-day session.

Important Defending the Perimeter Course Information

  • Recommended Experience

    • Basic security knowledge at the level of:
      • Course 468, System and Network Security Introduction
    • Working knowledge of TCP/IP and client server architecture

Defending the Perimeter Course Outline

  • Setting Your Security Objectives

    Defining security principles

    • Ensuring data Confidentiality, Integrity and Availability (CIA)
    • Assessing defensive techniques
    • Setting a generic security stance

    Developing a security policy

    • Balancing risk with business requirements
    • Identifying your information assurance objectives
    • Choosing security technologies
  • Deploying a Secure Firewall

    Installing a firewall

    • Determining the appropriate firewall type
    • Selecting and hardening the operating system
    • Virtualising the firewall appliance

    Configuring a firewall to support outgoing services

    • Supporting simple services: HTTP, SMTP
    • Filtering dangerous content and handling encrypted traffic
    • Managing complex services: VoIP, audio and video

    Providing external services securely

    • Implementing publicly accessible servers
    • Building a DMZ architecture
    • Supporting SMTP mail

    Allowing access to internal services

    • Customising DNS for firewall architectures
    • Configuring Network Address Translation (NAT)
    • Developing access lists for client server applications
  • Detecting and Preventing Intrusion

    Deploying an IDS

    • Placing Network IDS (NIDS) within your network architecture
    • Operating sensors in stealth mode

    Detecting intrusions in the enterprise

    • Designing a multi-layer IDS hierarchy
    • Managing distributed IDS

    Interpreting alerts

    • Verifying IDS operation
    • Minimising false positives and negatives
    • Validating IDS events and recognising attacks

    Stopping intruders

    • Exploiting IDS active responses
    • Snipping a TCP session
    • Controlling access with a firewall update
  • Configuring Remote User Virtual Private Networks (VPNs)

    Building VPN tunnels

    • Compulsory vs. voluntary tunnels
    • Supporting remote users with layer 2 tunnels
    • Connecting remote sites with layer 3 tunnels

    Deploying client software

    • Assessing remote access VPN alternatives
    • Implementing remote user authentication
    • Leveraging Layer 2 Tunnelling Protocol (L2TP)
    • Protecting L2TP tunnels with IPsec Transport Mode
  • Creating Site-to-Site VPNs

    Applying cryptographic protection

    • Ensuring confidentiality with symmetric encryption
    • Exchanging symmetric keys with asymmetric encryption
    • Checking message integrity with hashing
    • Managing digital certificates with PKI

    Comparing tunnelling and protection methods

    • Employing VPN concentrators and VPN-capable routers
    • Applying IPsec Tunnel Mode
    • Assessing tunnelling protocols
    • Evaluating VPN topologies
  • Integrating Perimeter Defences

    Reducing the impact of denial-of-service (DoS) attacks

    • Mitigating bombardment attacks
    • Rejecting connection-based attacks with IPSs
    • Blackholing and sinkholing
    • Implementing a DoS Defence System (DDS)
    • Blacklisting attack sites and address ranges

    Perimeter architectures

    • Integrating IDS and VPNs with your firewall architecture
    • Positioning externally accessible servers
    • Monitoring and controlling wireless networks

Teamträning

Defending the Perimeter Training FAQs

  • Can I learn to defend the perimeter from cyber attacks online?

    Yes! We know your busy work schedule may prevent you from getting to one of our classrooms which is why we offer convenient online training to meet your needs wherever you want. This course is available in class and live online.

Questions about which training is right for you?

call 08-506 668 00




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

London / Online (AnyWare)
London / Online (AnyWare)
London / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Alexandria, VA / Online (AnyWare)
Herndon, VA / Online (AnyWare)
Hur föredrar du att bli kontaktad:

Please Choose a Language

Canada - English

Canada - Français