Review and Tips: Poker Casino Sport .
You are not logged in.
Training Course: Fundamentals of IT Security .
Network and Platform security, wireless technology, cryptography, VPNs, and Firewalls.
Emphasis is consistently placed on understanding and mitigating risk, defense-in-depth, vulnerability patterns, Best Practices , and effective countermeasures. The class can be enhanced with hands-on labs with your choice of Firewall and VPN technology.
Individuals seeking a solid grounding in IT Security; particularly those interested in subsequently learning more about any of the following: Network security, Platform security, Industrial Control System (ICS) security, and how to design and implement secure software.
3 Days.
Understand the importance of “Defense-in-Depth”.
Be familiar with a Security Domains framework that facilitates IT Risk recognition and reduction.
Be prepared to identify IT Security vulnerabilities and implement effective Countermeasures.
Be familar with important internetworking concepts and terms.
Understand the purpose and effective deployment of Firewall and VPN technology .
Internet access.
Cryptography Tools ( recommended ).
OpenSSL ( recommended ).
Lab Router(s), WAP(s), Firewalls (optional).
Lab IDPS(s) (optional).
Prerequisites & Setup.
Topic 3: Malware.
Viruses, Worms, and Trojans… Oh My !.
Malware Characteristic s.
Malware Detection and Removal.
Additional Resources.
Risk and Risk Management.
Threats and Attacker Motivation.
Internal Threats.
Examples of IT Security Risk.
Risk Valuation.
Lab Exercise: Closer to Home.
Topic 5: Internetworking Primer.
Networking Concepts and Terms.
The OSI Reference Model.
TCP/IP.
IP Addresses.
Ethernet.
Internetwork Communications.
Routers.
Dynamic Host Control Protocol (DHCP).
Domain Name Service (DNS).
Address Resolution Protocol (ARP).
Transport Layer.
User Datagram Protocol (UDP).
Transport Control Protocol (TCP).
What is a Virtual Private Network (VPN) ?.
Simple Network Management Protocol (SNMP).
Lab Exercise: Vulnerabilities.
What is a Firewall ?.
Network Address Translation (NAT).
Stateless Packet Filtering.
Stateful Inspection.
Firewall Policy.
Firewalls and Network Architecture.
Unified Policy Approach.
Lab Exercise: Fire Prevention.
Security Domains Revisited.
Security Domains and Change.
General Security.
Access Control.
Platform Security.
Network Security.
Application Security.
Lab Exercise: Close to Home.
Topic 8: Introduction to Cryptography.
Message Integrity.
Message Integrity: SHA.
Steganography.
Encryption Methods.
Symmetric Encryption.
Stream Ciphers.
Encryption Methods: Block Cipher Modes.
Data Encryption Standard (AES).
Advanced Encryption Standard (AES).
Secure Key Exchange.
Asymmetric Encryption (Public Key Cryptography).
Overview of Cryptanalysis.
Lab Exercise: I Said What ?.
Topic 9: Public Key Infrastructure.
Digital Signatures.
Digital Certificates.
Public Key Cryptography.
Public Key Infrastructure.
How HTTPS Works.
X.509 Digital Certificates.
Example: Digital Certificates.
Certificate Authorities.
Trust Models.
Certificate Validation.
Certificate Revocation.
Key Management.
Topic 10: Understanding Virtual Private Networks (VPNs).
VPN Technologies Overview.
Deployment Architectures.
IPsec Overview.
Authentication Header (AH).
Internet Key Exchange (IKE).
IPComp.
VPN Operational Overview.
VPN Implementation.
Overview.
WLAN Technologies and Standards.
WLAN Vulnerabilities.
WAP Countermeasures.
802.11.
802.11i.
Lab Exercise: On the Air !.
Topic 12: Intrusion Detection and Prevention Systems.
Functions.
Network Based Solutions.
Detection Technologies.
Prevention Features.
IDS/IPS Deployment.
IDPS Limitations.
Host Based Solutions.
Protecting Wireless Networks.
IDPS Challenges.
Sample Products.
Lab Exercise: Product Research.
Appendix Acronyms.
For more information or to register for this training course, call 1-800-840-2335 or on our website.
[email protected]
Training Course: Fundamentals of IT Security.
Theme: by aThemes.
Offline