Endpoint Security and Network Access Control

Course 2011 | 4 Days

Attendee Rating

Evaluations in the Last 12 Months
  • 5 stars: 79%
    5 Star Ratings: 79%
  • 4 stars: 18%
    4 Star Ratings: 18%
  • 3 stars: 3%
    3 Star Ratings: 3%
  • 2 stars: 0%
    2 Star Ratings: 0%
  • 1 star: 0%
    1 Star Ratings: 0%
4.76 stars (38 reviews)
Endpoint Security and Network Access Control

You Will Learn How To:

  • Enforce security policies to protect sensitive data from internal and external threats
  • Deploy Network Access Control to prevent malware contamination
  • Implement Data Loss Prevention (DLP) through host-based IDS/IPS and endpoint encryption
  • Regulate USB devices and optimize anti-malware
Endpoint Security and Network Access Control

Hands-On Experience Includes:

  • Implementing port security
  • Deploying agent software to manage endpoints
  • Assigning endpoints dynamically to VLANs
  • Enforcing anti-malware policies
  • Controlling peripheral device access
  • Requiring encryption on attached network devices

About This Course: Controlling access to intranet resources is critical. Many organizations do not know who and what is connected to their networks, as well as the status of defenses and configuration. As a result, they may be experiencing security breaches caused by rogue or insecure systems. This course enables you to control admission, security status and configuration of all endpoints in your organization.


NEW! FREE After-Course Instructor Coaching - available after May 1, 2014.
Click here to learn more about this & other Attendee Benefits

  • Course Info

    Course 2011 Content

    Introduction to Endpoint Security

    Internal defenses vs. perimeter defenses

    • Defining a holistic security posture
    • Assessing threats from client-side and internal attacks
    • Shifting the paradigm from a fortress mentality

    Establishing a secure internal architecture

    • Instituting a risk-based access control policy
    • Choosing guest access strategies
    • Regulating, monitoring and controlling network traffic

    Establishing VLANs to Isolate Traffic

    Developing a VLAN strategy

    • Deciding on the number and types of VLANs
    • Configuring VLAN trunking
    • Managing VLAN access centrally

    Segregating and isolating traffic

    • Restricting access with port security
    • Setting up quarantine and guest VLANs
    • Managing port security violations

    Implementing Network Access Control (NAC)

    Installing a NAC server

    • Implementing and authenticating with EAP
    • Leveraging VLAN infrastructure

    Securing access with 802.1X

    • Configuring authentication agents
    • Deploying certificates and RADIUS servers
    • Denying rogue devices

    Establishing Policy Servers and Repositories

    Implementing policy-based access control

    • Configuring system health requirements
    • Creating a Bring Your Own Devices (BYODs) policy

    Managing patches and anti-malware updates

    • Establishing software repositories
    • Pushing OS and application patches to clients

    Monitoring and enforcing endpoint security

    • Checking system health against policy
    • Validating pre-connect and post-connect profiles
    • Quarantining and remediating noncompliant devices

    Managing Confidentiality for Data at Rest

    Establishing an encryption policy

    • Handling mobile devices and removable media
    • Integrating encryption with Data Loss Prevention (DLP)

    Implementing encryption

    • Leveraging PKI to generate corporate recovery keys
    • Enforcing full and partial disk encryption for endpoints

    Preventing and Detecting Data Exfiltration

    Developing a data loss strategy

    • Permitting required traffic and denying dangerous traffic
    • Configuring enterprise host firewalls
    • Regulating attached USB and portable devices

    Monitoring and detecting data leakage

    • Preventing covert tunnels within DNS and HTTP(S) traffic
    • Preventing Personally Identifiable Information (PII) leaks
    • Identifying attempts to steal data

    Implementing Anti-Malware Defenses

    Deploying anti-malware

    • Pushing defensive software to endpoints
    • Establishing internal anti-malware signature update servers
    • Managing mobile and remote users

    Managing enterprise anti-malware configuration

    • Configuring scanning policies
    • Determining responses to infection alerts
    • Securing anti-malware configurations

    Deploying host-based IDS/IPS

    • Monitoring host processes
    • Deciding among deployment options

    Reporting and Compliance Checking

    Responding to and mitigating attacks

    • Assessing incidence response strategies
    • Developing mitigation and containment strategies

    Demonstrating organizational compliance

    • Generating reports for compliant and noncompliant systems
    • Complying with government regulations
    • Tracking policy effectiveness
    • Producing policy violation reports

    Who Should Attend

    Security professionals seeking to enforce security policies for the protection of sensitive data and assets from internal and external threats. Knowledge at the level of Course 468, "System and Network Security Introduction," is assumed.

    Training Hours

    Standard class hours:
    9:00 a.m. - 4:30 p.m.

    Last day class hours:
    9:00 a.m. - 3:30 p.m.

    Free optional course exam:
    3:30 p.m. - 4:30 p.m.

    Each class day:
    Informal discussion with instructor about your projects or areas of special interest:
    4:30 p.m. - 5:30 p.m.

  • More Course Info

    What is this course about?

    The best perimeter defenses do little to thwart user actions relative to social engineering ploys, weak password selection, and social networking misuse. This places the security burden on a sound internal security environment consisting of network access control and endpoint security. In addition, organizations need a last line of defense against clever hackers who may slice their way through the perimeter.

    This intermediate training course, Endpoint Security and Network Access Control, is a must-have for any security, network, or IT professional who needs to protect sensitive data (e.g., employee information, payroll, healthcare records, intellectual property) and internal assets from internal and external threats. Attendees will learn how to enforce security policies and access controls for key IT internal assets.

    Who will benefit from this course?

    This course targets security professionals who design, implement and, manage network and security solutions for their organizations or clients. Persons managing IT personnel, as well as those who develop, market and sell security solutions can benefit from the knowledge gained from this course.

    What background do I need?

    Knowledge at the level of Course 468, System and Network Security Introduction, or Course 446, CompTIA Security+® Certification Exam Prep, is assumed. Attendees should have basic knowledge of TCP/IP, switches or Active Directory.

    What is the difference between this course and Course 2010, Defending the Perimeter from Cyber Attacks?

    The focus of this course is to reduce risk from threats to internal resources, workstations and servers. Students learn to apply Network Access Control to regulate admission to the Intranet and enforce workstation baselines and defensive applications.

    Course 2010, Defending the Perimeter from Cyber Attacks, focuses on regulating and filtering traffic through the perimeter by means of firewalls, proxies, VPNs and Network Intrusion Detection.

    Is this course based on a specific vendor's solution?

    This course addresses this topic with a multi-vendor approach, covering both network access and control of system configuration and health from several major vendors, including: Cisco, McAfee, and Microsoft.

    Does the course cover Network Access Control (NAC) and 802.1X?

    Yes, the course includes port and policy-based authentication with 802.1X and RADIUS.

    What key concepts does the course cover?

    This course covers the following key concepts:

    VLANs and quarantine, Network Access Protection (NAP), 802.1X, Network Access Control (NAC), remediation, HBSS, Data Loss Prevention (DLP), Data exfiltration, network admissions policies, internal and endpoint security, cyber security, Honeypot technology, Computer Network Defense (CND), Data at rest encryption, portable media, mobile devices, BYOD, compliance, Host-based IDS/IPS, application patch management, and others.

    If I am familiar with Cisco but have little experience with Microsoft (or vice versa), should I take this course?

    Yes, the course is designed to build and enhance your knowledge in your growth areas. It is not necessary to be proficient in multiple disciplines.

    How will this course help further my career or help me in my job role?

    This course offers an organized approach to controlling access to internal networks and ensuring that attached machines are safe. There are few if any courses that address this topic with a multi-vendor approach, covering both network access and control of system configuration and health. This course provides a roadmap to put together the two components of security – by controlling the access and protecting your endpoints, which you can put to use immediately.

    How much time is spent on each topic?

    Content Hours
    Introduction to internal network defenses 2.0
    Establishing VLANs to isolate traffic 2.5
    Implementing Network Access Control (NAC) 3.0
    Establishing policy servers and repositories 4.0
    Managing confidentiality for data at rest 4.5
    Preventing and detecting data exfiltration 2.5
    Implementing anti-malware defenses 2.5
    Enabling internal Intrusion Detection and Prevention (IDS/IPS) 3.0
    Reporting and compliance checking 1.0

    Times, including the workshops, are estimates; exact times may vary according to the needs of each class.

    What kinds of hands-on exercises are included in the course?

    Hands-on exercises account for 40% of class time and include:

    • Regulating admission to networks
    • Deploying agent software to manage endpoints
    • Configuring authentication services
    • Enforcing anti-malware policies
    • Controlling peripheral device access
    • Requiring encryption on attached network devices

    I'm attending this course from work using AnyWare - Learning Tree's web-based remote attendance platform. How will that impact what I learn?

    You will participate fully in the course and acquire the same knowledge and skills as your classmates who participate in the classroom. You will have the same course materials, be able to easily communicate back and forth and ask questions of your instructors and peers, and you will control an in-classroom workstation dedicated entirely to you. Your instructor will be able to see exactly what you're doing and can interactively offer concrete help.

    How is this course related to other Learning Tree courses?

    Learning Tree offers a number of courses that will help you expand upon the knowledge gained in this course and further your skills in several key areas. Those courses include:

  • Certification/Credits

    Many Learning Tree courses provide college credit and industry continuing education credits. You can also earn a Learning Tree Professional Certification in your area of expertise and prepare for popular industry certifications. See below for continuing professional development credits associated with this course.

    College Credit – 1 Semester Hours This course qualifies for 1 semester hour of college credit as certified by the American Council on Education's College Credit Recommendation Service (ACE CREDIT). Read More...
    Certification Core Course This course qualifies as a Core Course in our Job-Specific Professional Certification Program. Read More...
    CompTIA 23 CEUsThis course is approved by CompTIA for continuing education units (CEUs). Read More...
    CPE 23 CreditsThis course qualifies for 23 CPE credits from the National Association of State Boards of Accountancy CPE program. Read More...
  • Tuition

    4-Day TuitionNew AttendeeReturning AttendeeNotes
    Commercial $2,810$2,530

    Click here for multi-course savings plans.

    Tuition payment is not required at time of enrollment.

    Government $2,499$2,249

Guaranteed to Run Guaranteed to Run event

Scheduled Event Scheduled event

LiveLinked Event LiveLinked event

Course Dates
4 Days

Attend from Home, Work or AnyWare Center Via AnyWare Learn More »

AnyWare

Attend In-Class or LiveLinked at an Education Center
Learn More »

Ed. Center

1

First - Select Your Date:

2

Then - Select Your Attendance Method:

Your Attendance Options
for this Instructor-Led Course

AnyWare

Attend from Home, Work or your nearest AnyWare Learning Center via AnyWare

Attend via AnyWare

Experience your course from home, work or your nearest AnyWare Learning Center and enjoy the same highly effective, hands-on instructor-led training using AnyWare – our superior, web-based course attendance platform. To learn more about AnyWare, Click here »

Education Center

Attend from one of our Education Centers or from a Attend from a LiveLinked ClassroomLiveLinked Classroom™

Attend in an Education Center

In-Class at an Education Center

Experience your course in a purpose-built Education Center that provides many unique amenities. To learn more about our Education Centers, Click here »

From a Attend from a LiveLinked ClassroomLiveLinked Classroom

Experience your course in a custom-designed LiveLinked Classroom, which is connected to your instructor-led course at the hosting education center. You and your fellow attendees are provided with:

  • Dedicated computers
  • Multiple large high-definition displays
  • An advanced audio and video system

To learn more about LiveLinked Classrooms, Click here »

Tuition & Savings Plans

Take advantage of our Multi-Course Tuition Savings Plans. Learn more »



Enroll Today – Hassle Free!

Call 1-888-843-8733 or enroll online by selecting your date above.

  • No advance payment required.
  • No fees for cancellation or rescheduling, ever.
  • Take up to 30 days after your course date to pay.
  • Satisfaction guaranteed – or you pay no tuition.

You can bring this course on-site to your organization

Bring Learning Tree Training to your workplace with our On-Site Training Solution. Learn more »