Type to search LearningTree.com

Do you mean "{{response.correctedQuery}}" ?

Sorry, no results were found for your query.

Please check your spelling and try your search again.

 

Security Training









Preferred method of contact?

Defending the Perimeter from Cyber Attacks

COURSE TYPE

Practitioner

Course Number

2010

Duration

4 Days

Enroll

About This Course: As organizations continue to rely on the Internet to enable communications and access to data among employees, vendors and partners, they need to ensure the confidentiality, integrity and availability of that information. This course provides comprehensive training to equip IT professionals with the skills required to implement and manage key elements of a secure network.

You Will Learn How To

  • Fortify your network perimeter to provide an integrated defense
  • Prevent or mitigate the effects of network attacks with a firewall
  • Detect and respond to network attacks with Intrusion Detection and Prevention (IDP)
  • Design, install and configure secure Virtual Private Networks
  • Mitigate the impact of Denial-of-Service (DoS) attacks

Important Course Information

Recommended Experience:

  • Basic security knowledge at the level of:
    • Course 468, System and Network Security Introduction
  • Working knowledge of TCP/IP and client server architecture

Course Outline

  • Setting Your Security Objectives

Defining security principles

  • Ensuring data Confidentiality, Integrity and Availability (CIA)
  • Assessing defensive techniques
  • Setting a generic security stance

Developing a security policy

  • Balancing risk with business requirements
  • Identifying your information assurance objectives
  • Choosing security technologies
  • Deploying a Secure Firewall

Installing a firewall

  • Determining the appropriate firewall type
  • Selecting and hardening the operating system
  • Virtualizing the firewall appliance

Configuring a firewall to support outgoing services

  • Supporting simple services: HTTP, SMTP
  • Filtering dangerous content and handling encrypted traffic
  • Managing complex services: VoIP, audio and video

Providing external services securely

  • Implementing publicly accessible servers
  • Building a DMZ architecture
  • Supporting SMTP mail

Allowing access to internal services

  • Customizing DNS for firewall architectures
  • Configuring Network Address Translation (NAT)
  • Developing access lists for client server applications
  • Detecting and Preventing Intrusion

Deploying an IDS

  • Placing Network IDS (NIDS) within your network architecture
  • Operating sensors in stealth mode

Detecting intrusions in the enterprise

  • Designing a multi-layer IDS hierarchy
  • Managing distributed IDS

Interpreting alerts

  • Verifying IDS operation
  • Minimizing false positives and negatives
  • Validating IDS events and recognizing attacks

Stopping intruders

  • Exploiting IDS active responses
  • Snipping a TCP session
  • Controlling access with a firewall update
  • Configuring Remote User Virtual Private Networks (VPNs)

Building VPN tunnels

  • Compulsory vs. voluntary tunnels
  • Supporting remote users with layer 2 tunnels
  • Connecting remote sites with layer 3 tunnels

Deploying client software

  • Assessing remote access VPN alternatives
  • Implementing remote user authentication
  • Leveraging Layer 2 Tunneling Protocol (L2TP)
  • Protecting L2TP tunnels with IPsec Transport Mode
  • Creating Site-to-Site VPNs

Applying cryptographic protection

  • Ensuring confidentiality with symmetric encryption
  • Exchanging symmetric keys with asymmetric encryption
  • Checking message integrity with hashing
  • Managing digital certificates with PKI

Comparing tunneling and protection methods

  • Employing VPN concentrators and VPN-capable routers
  • Applying IPsec Tunnel Mode
  • Assessing tunneling protocols
  • Evaluating VPN topologies
  • Integrating Perimeter Defenses

Reducing the impact of denial-of-service (DoS) attacks

  • Mitigating bombardment attacks
  • Rejecting connection-based attacks with IPSs
  • Blackholing and sinkholing
  • Implementing a DoS Defense System (DDS)
  • Blacklisting attack sites and address ranges

Perimeter architectures

  • Integrating IDS and VPNs with your firewall architecture
  • Positioning externally accessible servers
  • Monitoring and controlling wireless networks
Show complete outline
Show Less

Course Schedule

Attend this live, instructor-led course In-Class or Online via AnyWare.

Hassle-Free Enrollment: No advance payment required.
Tuition due 30 days after your course.

Apr 11 - 14 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare
In-Class

Jun 6 - 9 AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare

Jul 25 - 28 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare
In-Class

Nov 6 - 9 AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare

Dec 5 - 8 Herndon, VA/AnyWare Enroll Now

How would you like to attend?

Live, Online via AnyWare
In-Class

Guaranteed to Run

Bring this Course to Your Organization and Train Your Entire Team
For more information, call 1-888-843-8733 or click here

Tuition

Standard

$2990

Government

$2659

Course Tuition Includes:

After-Course Instructor Coaching
When you return to work, you are entitled to schedule a free coaching session with your instructor for help and guidance as you apply your new skills.

Free Course Exam
You can take your course exam on the last day of your course and receive a Certificate of Achievement with the designation "Awarded with Distinction."

Prev
Next

Questions

Call 1-888-843-8733 or click here »

An experienced training advisor will happily answer any questions you may have and alert you to any tuition savings to
which you or your organization may be entitled.

Training Hours

Standard Course Hours: 9:00 am – 4:30 pm
*Informal discussion with instructor about your projects or areas of special interest: 4:30 pm – 5:30 pm


FREE Online Course Exam (if applicable) – Last Day: 3:30 pm – 4:30 pm
By successfully completing your FREE online course exam, you will:

  • Have a record of your growth and learning results.
  • Bring proof of your progress back to your organization
  • Earn credits toward industry certifications (if applicable)
  • Make progress toward one or more Learning Tree Specialist & Expert Certifications (if applicable)

Enhance Your Credentials with Professional Certification

Learning Tree's comprehensive training and exam preparation guarantees that you will gain the knowledge and confidence to achieve professional certification and advance your career.

This course is approved by CompTIA for continuing education units (CEUs). For additional information and to confirm which courses are eligible towards your CompTIA certification, click here.

Earn 23 Credits from NASBA

This course qualifies for 23 CPE credits from the National Association of State Boards of Accountancy CPE program. Read more ...

- ,

Prev
Next
s