Home    |    Instructor-led Training    |    Online Training     
         
 
Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
BlockChain
Business Analysis
Business Intelligence
Business Objects
Business Skills
C/C++/Go programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Data Science
Datawarehousing
DB2
Desktop Application Software
DevOps
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PostgreSQL
PowerBuilder
Professional Soft Skills Workshops
Project Management
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Unisys Mainframe
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Network Security Fundamentals
This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT training needs. Wintrac’s course catalog of over two thousand courses includes courses on Security Training

Overview

Network Security Fundamentals is designed to provide Network Administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. This course is the first course offered in Level One: Defense of the Security Certified Program.

Prerequisites

It is assumed that the Network Administrator will have experience with Windows 98, DOS, Windows NT/2000 (client and server), and Linux environments, and have taken the following courses or have equivalent experience:
  • CompTIA A+ Certification: Core Hardware
  • CompTIA A+ Certification: Operating Systems
  • CompTIA Network+ Certification
Target Student:

We designed the Network Security Fundamentals course for the student who is a Network Administrator responsible for maintaining a wide range of network technologies.

Performance-Based Objectives

  • Identify the basics of network security.
  • Define the TCP/IP layered architectures and work with advanced IP addressing protocols and commands.
  • Describe and work with IP protocols and packets at various levels.
  • Create router security using the functions of Access Control Lists.
  • Secure Windows NT and 2000 computers, and test security effectiveness.
  • Secure Linux computers and test security effectiveness.
  • Define the common Internet components and identify techniques used in Web hacking.
  • Examine and work with the common techniques used to attack networks and specific operating systems.
Delivery Method

Instructor-led, group-paced, classroom-delivery learning model with structured minds-on and hands-on activities.

Benefits

Students will learn to work with various protocols, and create security in router-based networks and across different platforms. They will also use some of the techniques that network attackers commonly use to learn how to best stop them.

What's Next

After completing this course, students wishing to complete Level One: Defense of the Security Certified Program should take the next course in the series, Network Defense and Countermeasures.

Hardware/Software Requirements

You will need:

  • Operating Systems
    • Bootable DOS 6.22 floppy disk (with important utilities like FDISK.exe, FORMAT.exe, MSCDEX.exe, etc.). You can use the complete DOS 6.22 on three disks if you wish, but it is not necessary.
    • Windows 98 CD.
    • Windows NT 4.0 Server CD.
    • Windows 2000 Server CD.
    • Red Hat Linux 7.1 on two CDs. Download the ISO files and create CDs from these images (when burning CDs, choose the Burn As Image option). This will ensure that they are bootable.
    • Drivers for all the operating systems. You should always keep these handy. In addition to having them on a CD-ROM, it is generally advisable to keep these around on a properly labeled set of floppy disks as well, as a last line of defense.
  • Service Packs and upgrades
    • SP2 for Windows 2000.
    • SP6a for Windows NT 4 Server.
    • Internet Explorer 4.0 or later. Use version 5.0 for NT 4.0.
  • Disk cloning tools and SID changing utilities
    • Norton's Ghost is recommended for cloning.
    • Norton's Ghostwalk is recommended for SID changing.
  • Hardware
    • One instructor machine.
    • One student machine per student.
    • Three Cisco routers (2500 Series preferred; IOS v.11.2 or greater).
    • Two serial cables (Part #SC–9595 was used with the 2500 Series).
    • Two 10/100 switches or hubs.
    • Cisco console cable.
    • Three transceivers (CentreCOM 210TS were used with the 2500 Series).
  • (Optional) Internet access
  • Machine
    • Pentium III 500 processor (700 recommended).
    • At least 128 MB of RAM (256 MB recommended).
    • A minimum of 8 GB of available hard drive space.
    • One non-integrated Network Interface Card per PC (Intel or 3Com preferred for promiscuous mode support).
    • A video card (Nvidia TNT2 recommended—from the point of view of driver availability for all OSes).
Course duration

5 Days

Course outline

Lesson 1: Foundations of Network Security
  • Topic 1A: The Principles of Network Security
  • Topic 1B: Network Security Terminologies
  • Topic 1C: Network Security and Data Availability
  • Topic 1D: Components of Network Security
  • Topic 1E: Network Security Policies
Lesson 2: Advanced TCP/IP
  • Topic 2A: The Concepts of TCP/IP
  • Topic 2B: Concepts of TCP
  • Topic 2C: The Suite and the Services
  • Topic 2D: Internet Protocol Security (IPSec)
  • Topic 2E: Internet Protocol version 6 (IPv6)
Lesson 3: IP Packet Structure
  • Topic 3A: Network Monitor
  • Topic 3B: The IP Header
  • Topic 3C: The TCP Header
  • Topic 3D: Connections
  • Topic 3E: The UDP Header
  • Topic 3F: The ICMP Message
  • Topic 3G: Packet Fragmentation
  • Topic 3H: Analyze an Entire Session
Lesson 4: Routing and Access Control Lists
  • Topic 4A: The ARP Process
  • Topic 4B: Cisco Routing Modes
  • Topic 4C: The Routing Process
  • Topic 4D: Routing Tables
  • Topic 4E: Access Control Lists
  • Topic 4F: Implementing ACLs
Lesson 5: Securing Windows Computers
  • Topic 5A: Windows NT 4.0 Fundamental Security
  • Topic 5B: Windows NT 4.0 Resource Security
  • Topic 5C: Windows 2000 Infrastructure
  • Topic 5D: Windows 2000 Authentication
  • Topic 5E: Windows 2000 User and Group Security
  • Topic 5F: Windows 2000 Resource Security
  • Topic 5G: Windows 2000 Encrypting File System
  • Topic 5H: Windows 2000 Network Security
Lesson 6: Securing Linux Computers
  • Topic 6A: Linux Operating System vs. Kernel
  • Topic 6B: Linux Administration and Security
  • Topic 6C: Key Linux Network Files
  • Topic 6D: Key Linux Network Processes
  • Topic 6E: Key Linux Network Commands
  • Topic 6F: Hardening Linux
  • Topic 6G: Portmap and Linux
  • Topic 6H: Network File System (NFS) and Linux
  • Topic 6I: Network Information Service (NIS) and Linux
Lesson 7: Security on the Internet and the World Wide Web
  • Topic 7A: Components of the Internet
  • Topic 7B: The Weak Points of the Internet
  • Topic 7C: The Techniques of Web Hacking
  • Topic 7D: Methods of Attacking Users
Lesson 8: Attack Techniques
  • Topic 8A: Network Reconnaissance
  • Topic 8B: Mapping the Network
  • Topic 8C: Sweeping the Network
  • Topic 8D: Scanning the Network
  • Topic 8E: Viruses, Worms, and Trojan Horses
  • Topic 8F: Gaining Control over the System
  • Topic 8G: Recording Keystrokes
  • Topic 8H: Cracking Encrypted Passwords
  • Topic 8I: Reveal Hidden Passwords
  • Topic 8J: Social Engineering
  • Topic 8K: Case Study: Social Engineering
  • Topic 8L: Gaining Unauthorized Access
  • Topic 8M: Hiding Evidence of an Attack
  • Topic 8N: Performing a Denial of Service

Please contact your training representative for more details on having this course delivered onsite or online

Training Outlines - the one stop shopping center for IT training.
© Training Outlines All rights reserved