Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Advanced Security Implementation
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Security Training

Overview

This course is designed to provide the foundation knowledge to network administrators and security professionals who are seeking to learn about advanced security issues surrounding PKI and biometrics. Advanced Security Implementation is designed to provide network administrators and security architects with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the first course offered in the second level of the Security Certified Program. This course is followed by Enterprise Security Solutions (ESS).

Prerequisites

To ensure your success, you are strongly recommended to first take the following courses or have equivalent knowledge:
  • Hardening the Infrastructure
  • Network Defense and Countermeasures
Hardware/Software Requirements

  • Operating Systems:
    • Windows 2000 Server CD-ROM (Server will be installed as a standalone server).
    • Drivers for Windows 2000 (including network, video, and audio).
  • Service Packs:
    • Service Pack 2 for Windows 2000.
  • Hardware:
    • Two computers per instructor.
    • One computer per student.
    • One 10/100 switch or hub.
    • RSA SecurID Key Fob Tokens.
    • BioLinkUSA U-Match USB mouse, one per student. Obtained from BioLinkUSA at www.biolinkusa.com.
    • Panasonic BM-ET100US Authenticam, one per classroom. Obtained from Panasonic at www.panasonic.com/cctv/products/bmet100us.asp.
    • One microphone per student recommended.
    • One set of speakers per student is recommended.
  • Internet Access:
    • Several tasks do require Internet access from student machines.
    • May substitute instructor demos if required.
  • Computers:
    • Pentium III 500 MHz (750 MHz recommended).
    • 128 MB of RAM (256 MB recommended).
    • 8 GB of hard disk space.
    • One 10/100 network card (card that can run in promiscuous mode recommended).
    • Audio capabilities.
  • RSA SecurID System:
    • RSA ACE/Server.
    • RSA ACE/Server License.
    • RSA ACE/Agent.
    • RSA SecurID Key For Hardware Tokens (one Token per Student is recommended).
    • RSA SecurID Token Records.
  • Tools and Utilities:
    • WinZIP—For file management (download from www.winzip.com).
    • Acrobat Reader—For file reading (download from www.adobe.com).
    • RSA ACE/Server SecurID—Strong Authentication (available at www.rsasecurity.com/go/profile2.asp, evaluation of this product is available).
    • RSA ACE/Agent SecurID—Strong Authentication (available at www.rsasecurity.com/go/profile2.asp, evaluation of this product is available).
    • CrypTool—Cryptography (download from www.cryptool.com).
    • EnCase—Forensics (must request Encase Forensics CD from www.guidancesoftware.com/corporate/inforequest/request_demo.shtm).
    • Sha_Verify—Forensics (download from www.dmares.com/maresware/freesoftware.htm).
    • ThumbsPlus—Forensics (download from www.cerious.com/download.shtml).
    • dtSearch—Forensics (download from www.dtsearch.com/download.html).
    • WinHEx—Forensics (download from www.winhex.com/winhex/index-m.html).
    • Quick View Plus—Forensics (download form to fill out at www.avantstar.com/solutions/quick_view_plus/default.aspx).
    • fport—Forensics (download from www.foundstone.com/resources/termsofuse.htm?file=fport.zip).
    • JPHS for Windows (Steganography)—Forensics (download from http://linux01.gwdg.de/~alatham/stego.html).
    • BioLink Mouse Software—Biometrics (with product from BioLinkUSA).
    • Panasonic Iris Software—Biometrics (with product from Panasonic).
    • Anovea Voice Software—Biometrics (download from www.anovea.com/www/download.htm).
    Performance-Based Objectives

    • Describe the fundamentals of trusted networks.
    • Describe the concepts and principles of cryptography.
    • Implement computer forensic tools.
    • Identify current laws and legislation that influence computer security professionals.
    • Describe biometric solutions, including fingerprint scanning, iris scanning, and vocal scanning.
    • Describe strong authentication solutions and implement token-based strong authentication.
    • Describe the function of digital certificates.
    • Describe the implementation of digital signatures.
    Delivery Method

    Instructor-led, group-paced, classroom-delivery learning model with structured, hands-on activities.

    Course duration

    5 Days

    Course outline

    Lesson 1: Introduction to Trusted Networks

    • Topic 1A: The Need For Trusted Networks
    • Topic 1B: Authentication and Identification
    • Topic 1C: Public Key Infrastructure
    • Topic 1D: Applications of PKI


    Lesson 2: Cryptography and Data Security

    • Topic 1A: The Need For Trusted Networks
    • Topic 2A: History of Cryptography
    • Topic 2B: Math and Algorithms
    • Topic 2C: Private Key Exchange
    • Topic 2D: Public Key Exchange
    • Topic 2E: Message Authentication


    Lesson 3: Computer Forensics

    • Topic 3A: Incident Response
    • Topic 3B: Computer Forensic Fundamentals
    • Topic 3C: Hard Disk Structure
    • Topic 3D: Forensic Tools
    • Topic 3E: Investigating Computers
    • Topic 3F: Computer Forensics Solutions


  • Lesson 4: Law and Legislation

    • Topic 4A: Intellectual Property
    • Topic 4B: Categories and Types of Law
    • Topic 4C: Process of Handling Evidence
    • Topic 4D: Information Security-related Laws and Acts


    Lesson 5: Biometrics—Who You Are

    • Topic 5A: The Process of Biometrics Today
    • Topic 5B: Accuracy of Biometrics
    • Topic 5C: Applications of Biometrics
    • Topic 5D: Fingerprint Scanning
    • Topic 5E: Facial Scanning
    • Topic 5F: Iris and Retinal Scanning
    • Topic 5G: Vocal Scanning
    • Topic 5H: Further Biometric Technologies
    • Topic 5I: Techniques for Compromising Biometrics


    Lesson 6: Strong Authentication

    • Topic 6A: Why Strong Authentication
    • Topic 6B: Authentication Tokens
    • Topic 6C: RSA SecurID
    • Topic 6D: Smart Cards


    Lesson 7: Digital Certificates

    • Topic 7A: Paper Certificates and Identity Cards
    • Topic 7B: Authorities that Issue Physical Certificates
    • Topic 7C: The Importance of Protecting the Identity of the CA
    • Topic 7D: Differences between Physical and Digital Certificates
    • Topic 7E: Standards for Digital Certificates
    • Topic 7F: X.509 as an Authentication Standard
    • Topic 7G: Case Study—VeriSign’s Digital Certificates


    Lesson 8: Digital Signatures

    • Topic 8A: Signatures as Identifiers
    • Topic 8B: Features of Digital Signatures
    • Topic 8C: Digital Signatures in Practice
    • Topic 8D: Standards for Digital Signatures
    • Topic 8E: Digital Signatures and PKI


    Appendix A: About FIPS PUB

    • Federal Information Processing Standards Publication


    Appendix B: PKI-related Acronyms

    • PKI-related Acronyms

    Please contact your training representative for more details on having this course delivered onsite or online

    Training Outlines - the one stop shopping center for IT training.
    © Training Outlines All rights reserved