This course provides a unique, in-depth look at the major business challenges and threats that are introduced when an organization’s network is connected to the public Internet. This course also provides a comprehensive explanation of network security basics, including how hackers access online networks and the use of Firewalls and VPNs to provide security countermeasures.
In addition to premium instructional content from Jones & Bartlett Learning’s comprehensive Information Systems Security and Assurance (ISSA) curriculum, this course provides access to a customized “virtual sandbox” learning environment that aggregates an unparalleled spectrum of cybersecurity applications. Providing instant, unscheduled access to labs from the convenience of a web-browser, this course allows you to practice “white hat” hacking on a real IT infrastructure-these are not simulations. Winner of the “Security Training and Educational Programs” top prize at the prestigious 2013 Global Excellence Awards by Info Security Products Guide, the industry’s leading information security research and advisory guide, these labs provide valuable exposure to complex, real world challenges and over 200 hours of training exercises on how hackers and perpetrators use these applications and tools.
Certification:
This course covers content within the following industry certification exams:
- Certified Information Systems Security Professional (CISSP) – two content domains covered
- Security + – “Network Security” domain
- 8570.01 – “Network Security”
- Systems Security Certified Practitioner (SSCP) – “Networks and Communications” domain
Course Duration:
5 days
What You’ll Learn
- Transmission Control Protocol/Internet Protocol (TCP/IP) behavior and applications used in IP networking
- Fundamental concepts of network security
- The impact that malicious exploits and attacks have on network security
- Network security tools and discuss techniques for network protection
- Fundamental functions performed by firewalls
- Firewall design strategies
- Foundational concepts of VPNs
- Network security implementation strategies and the roles each can play within the security life cycle
- Elements of firewall and VPN implementation and management
- Network security management best practices and strategies for responding when security measures fail
Who Needs to Attend
- Information security analysts
- Payroll specialists
- IT infrastructure security specialists
- People who decide which information technology and cybersecurity products to acquire for their organization
Prerequisites
General knowledge of networking and management information systems
Course Outline
1. Foundations of Network Security
- Fundamentals of Network Security
- Firewall Fundamentals
- VPN Fundamentals
- Network Security Threats and Issues
2. Technical Overview of Network Security, Firewalls, and VPNs
- Network Security Implementation
- Network Security Management
- Firewall Basics
- Firewall Deployment Considerations
- Firewall Management and Security
- Using Common Firewalls
- VPN Management
- VPN Technologies
3. Implementation, Resources, and the Future
- Firewall Implementation
- Real-World VPNs
- Perspectives, Resources, and the Future
Labs
Lab 1: Analyze Essential TCP/IP Networking Protocols
Lab 2: Network Documentation
Lab 3: Network Discovery and Reconnaissance Probing using ZenMap GUI (Nmap)
Lab 4: Perform a Software Vulnerability Scan and Assessment with Nessus®
Lab 5: Configure a Microsoft Windows Workstation Internal Firewall
Lab 6: Design a De-Militarized Zone (DMZ) for a LAN-to-WAN Ingress/Egress
Lab 7: Implement a VPN Tunnel between a Microsoft Server and Microsoft Clients
Lab 8: Design a Layered Security Strategy for an IP Network Infrastructure
Lab 9: Construct a Linux Host Firewall and Monitor for IP Traffic
Lab 10: Design and Implement Security Operations Management Best Practices
Software used in these labs include: Wireshark, PuTTY, FileZilla, Tftpd32, RSA NetWitness Investigator, Cisco IOS, Zenmap GUI, Nessus, Microsoft Windows Firewall, Microsoft Windows Network Policy Server (NPS), DVWA, Gufw, Bmon, Iftop, Pktstat, Iperf, Tcptrack, and Splunk. Please note that software may be updated or changed to keep pace with new data in the field.