Network Access Control Using the Risk Management Framework

Nivå: Intermediate

Help your organisation produce a comprehensive security posture by developing generally accepted practises for access control in network security. In this Network Access Control (NAC) training course, you will learn how to perform security breaches with techniques from the FISMA Risk Management Framework, utilise protocol analysers to track live attacks, analyse the effectiveness of network security control devices, and recommend improvements to block attacks. Help your organisation produce a comprehensive security posture by developing generally accepted practises. In this training course, you learn how to perform security breaches with techniques from the FISMA Risk Management Framework, utilise protocol analysers to track live attacks, analyse the effectiveness of security controls, and recommend improvements to block attacks.

Nyckelfunktioner:

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

Du kommer lära dig att:

  • Protect assets by selecting and managing effective security controls
  • Evaluate the thoroughness and quality of security controls
  • Do more than just "security theater"
  • Provide and monitor a comprehensive, strong defence
  • Integrate accessibility into services and environments

Välj den utbildningsform som passar dig bäst

LIVE, LÄRARLEDD

I klass & Live, Online-utbildning

  • 4-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Anpassa kurs och innehåll efter teamets behov

Kontakta oss

Utveckla dig och ditt team med anpassade eller öppna kurser alternativt e-learning

Learning Tree erbjuder kundanpassad utbildning hos er, öppna kurser i Stockholm, London eller Washington, möjlighet att delta via våra Anywhere centers (Malmö, Göteborg, Linköping, Stockholm eller Borlänge) eller olika former av e-learning med lärarstöd. Läs mer på www.learningtree.se/priser .

I klass & Live, Online-utbildning

Note: This course runs for 4 dagar *

*Events with the Partial Day Event clock icon run longer than normal but provide the convenience of half-day sessions.

  • 7 - 10 dec 9:00 - 4:30 GMT Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 1 - 4 mar 9:00 - 4:30 GMT Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 7 - 10 jun 9:00 - 4:30 BST Online (AnyWare) Online (AnyWare) Boka Din Kursplats

  • 31 aug - 3 sep 9:00 - 4:30 BST Online (AnyWare) Online (AnyWare) Boka Din Kursplats

Kurs med startgaranti

När du ser symbolen för “Guaranteed to Run” vid ett kurstillfälle vet du att kursen blir av. Garanterat.

Partial Day Event

Learning Tree offers a flexible schedule program. If you cannot attend full day sessions, this option consists of four-hour sessions per day instead of the full-day session.

Important Network Access Control Course Information

  • Recommended Experience

    • Previous experience in networking and TCP/IP protocol stack
    • Technical background in networking and security terms

Network Access Control Course Outline

  • Introduction

    • Applying defence in depth: tools, techniques and people
    • Comprehending FISMA and OMB oversight
    • Assimilating Risk Management Framework Security Life Cycle
  • Risk Management Framework

    Multi-tiered risk management

    • Organisation: Strategic risk management
    • Mission/Business: Tactical approach to risk
    • Information Systems

    Defining roles and responsibilities

    • Distinguishing hierarchy and key roles of risk management
    • Defining responsibilities assigned to specific roles
    • Separating roles and areas of responsibility

    Phases of risk management

    • Categorising information systems
    • Selecting security controls
    • Implementing security controls
    • Assessing security controls
    • Authorising information systems
    • Monitoring security controls
  • Information Assurance

    Introducing information assurance

    • Assuring security throughout the data life cycle
    • Integrating information assurance into software development
    • Building in "secure by design"
    • Implementing information assurance best practises
    • Ensuring component security

    Penetration testing and vulnerability assessments

    • Validating security functions and configuration
    • Finding weaknesses within systems before the attacker does

    Keeping current with information assurance

    • Full disclosure vs. responsible disclosure
    • Exploring vulnerability databases
  • Information Systems and Network Security

    Modularization (the OSI 7 Layer Model)

    • Networking principles powering the Internet
    • Modelling a packet

    Confidentiality, integrity and availability across the network

    • Encrypting for confidentiality
    • Sniffing the network and protocol analysis
    • Modifying data via man-in-the-middle attacks

    Networking services and security

    • Poisoning the DNS cache
    • Incorporating core services including DHCP, ICMP, and ARP
    • Hardening the TCP/IP stack
  • Authentication and Access Control

    Authenticating users

    • Managing factors of authentication (something you know, have or are)
    • Attacking passwords
    • Comprehending PKI and public key authentication systems
    • Evaluating the suitability of biometrics
    • Integrating multi-factor authentication

    Authenticating hosts

    • Incorporating ARP, DHCP, DNS and protocol insecurities
    • Performing and detecting MAC and IP address spoofing
    • Achieving strong host authentication
    • Analysing Kerberos and IPSec
  • Cryptography

    Encrypting and exercising integrity functions

    • Capitalising on asymmetric or Public Key cryptography
    • Applying symmetric cryptography
    • Exercising message digest functions for integrity

    Certificates and Certification Authorities

    • Clarifying PKI and certificate fields
    • Publishing certificate revocation and certificate security

    Digital signatures

    • Digitally signing for strong authentication
    • Proving authentication, integrity and non-repudiation
  • Accessibility

    • Promoting open data policies
    • Removing barriers to enhance accessibility for people
    • Enabling IT accessibility

Team Training

Network Access Control Training FAQs

  • How can I bring this course to my facility to teach my team Network Access Control?

    Enhance your team's effectiveness and boost productivity with instructor-led training delivered privately to your organisation, live online, or to any preferred location!

    Learn more about Private Team Training ›

     

Questions about which training is right for you?

call 08-506 668 00




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Online (AnyWare)
Online (AnyWare)
Online (AnyWare)
Online (AnyWare)
Hur föredrar du att bli kontaktad:

Please Choose a Language

Canada - English

Canada - Français