Duration: 35 Hours (5 Days) Focus: Policy Development, Threat Mitigation, and Incident Response
Day 1: Foundations, Policy, and Protocol Security 📝
Module 1: Introduction to Network Security Fundamentals
- Network Context (Review of Network topology, Network Types, and the OSI Model).
- Security Policy Core (What is Security Policy? What Defines a good security policy).
- Policy Structure and Implementation (Structuring a security policy, developing and implementing security guidelines).
- Policy Efficacy (Defining the Requirements of Effective Security Policy).
Module 2: Protocol Vulnerabilities and Hardening
- Core Network Protocols (Overview of protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, HTTP).
- IP Layer Security (IP: Attacks and Countermeasures).
- Transport Layer Threats (TCP, UDP: Attacks and Countermeasures).
- Application Service Weaknesses (Vulnerabilities in legacy services: FTP, TFTP, TELNET, SMTP).
Day 2: Threat Landscape, Attacks, and Physical Security 🚨
Module 3: Physical and Environmental Security
- Physical Threats (Physical Security Threats and implementing preventative measures).
- Access Control (Locks and Keys, Biometric Devices, and PC Security: Boot Access).
- Emanations Control (Understanding and mitigating TEMPEST issues).
- Fire Safety (Fire Suppression, Gaseous Emission Systems, and safety protocols).
- Device Protection (Laptop Security: Physical Security Countermeasures).
Module 4: Network Attack Vectors
- Threat Definitions (Current Statistics, defining key terms: Threats, Attack and Exploit).
- Attacker Classification (Classification of Hackers and Attacks).
- Injection and Manipulation (Web Page Defacement, SQL Injection, Buffer Overflow).
- Deception and Snooping (Spoofing, Eaves Dropping, Phishing, Wire Tapping).
- Wireless Attacks (War Driving, War Chalking, War Flying).
- Brute Force (War Dialing, Password Cracking).
- Availability Attacks (Denial of Service (DOS) Attacks and Distributed DOS).
Day 3: Defense Layers: Firewalls, IDS, and Network Hardening 🛡️
Module 5: Firewall Architecture and Deployment
- Threat Handling (Handling threats and security tasks, Protection against hacking).
- Firewall Types (Packet filtering and Stateful Packet Filtering).
- Advanced Deployments (Implementing Multi-layer firewall protection and Multi firewall DMZ).
- Specialized Firewalls (Specialty firewalls and Reverse firewalls).
- Centralization (Centralization and Documentation).
Module 6: Intrusion Detection and Prevention
- IDS Characteristics (Characteristics of IDS and the difference between Host based IDS Vs Network based IDS).
- Detection Methods (IDS Detection Methods and Types of Signatures).
- Prevention Systems (Intrusion Prevention System and the key difference between IDS Vs IPS).
- IPS Tools (Overview of IPS Tool capabilities).
Module 7: Core Network Security Services
- Network Address Translation (NAT) (Network Address Translation basics and security implications).
- Proxying and Gateways (Application layer gateway and Proxying).
- Bastion and Honeypots (Bastion Host, Honeypots and Honeynet configuration).
- VPN Fundamentals (VPN concepts and the Authentication process).
Module 8: Router and OS Hardening
- Router Security (Understanding Internet work Operating Systems (IOS) and Troubleshooting a router).
- Hardening Procedures (Hardening a Router and its Components of router security).
- Testing Tools (Overview of Router security: testing tools).
- OS Security (Windows) (Objects And Permissions, NTFS File System Permissions, Active Directory, Kerberos Authentication And Security, IP Security).
- OS Security (Linux) (Basic Linux hardening techniques).
Day 4: Application Security, Encryption, and WLAN 🔒
Module 9: Patch and Vulnerability Management
- Vulnerability Assessment (Vulnerability Assessment goals and methodology).
- Assessment Tools (Selecting vulnerability assessment tools).
- Patch Management (Red Hat Up2date, Microsoft Patch Management Process and Windows Update Services).
- Patch Tools (Using Qchain, Microsoft Baseline Security Analyzer, and other Patch Management Tools).
Module 10: Application and Web Security
- Web Application Security (Securing Web Applications).
- Secure Code (Writing Secure Code and Best Practices).
- Remote Administration (Remote Administration Security).
- Web Defenses (Network Devices and Design, Altering the Network Addresses).
- Client/Browser Security (Client Authorization and Secure Client Transmissions, Browser Security Settings, Malicious Code Detection).
- Input Validation (Common Gateway Interface (CGI), Web Application Input Data Validation and Buffer Overflows).
Module 11: Encryption and Confidentiality
- Core Concepts (Maintaining confidentiality, Firewalls Implementing Encryption).
- Cryptography (Public and Private Keys (including PGP), Choosing the size of keys).
- PKI (Digital certificates and Certificate Management Through PKI).
- Scheme Analysis (Analyzing popular encryption schemes including IPSEC).
Module 12: Wireless and Mobile Security
- WLAN Basics (Wireless Network Types, Antenna, WLAN Standards, BlueTooth And Ultra Wideband).
- Legacy Tools (WEP Description Tool (Air Snort and WEPCrack)).
- Modern WLAN Security (WLAN Security, WPA, TKIP, WTLS).
- Authentication (EAP Methods, RADIUS, Multifactor Authentication).
- Mobile Security (Mobile Security Through Certificates).
- Encryption Standards (Advanced Encryption Standards (AES), DES, RSA Encryption).
Day 5: VPNs, E-Mail, Fault Tolerance, and Incident Response 🩹
Module 13: Virtual Private Networks (VPN)
- Tunneling Protocols (VPN Tunneling Protocols overview).
- Specific Protocols (Details on PPTP and L2TP).
- VPN Security (VPN Security best practices).
Module 14: E-Mail Security
- Email Structure (Components Of An Email and E-mail protocols).
- Risks and Defense (E-Mail Security Risks and How to defend against E-Mail security risks).
Module 15: Fault Tolerance and Prevention
- Need for Resilience (Why Create Fault Tolerance, Reasons For System Failure).
- Planning (Planning For Fault Tolerance).
- Implementation (Network Security: Fault Tolerance).
- Measures (Preventive Measures).
Module 16: Incident Handling and Disaster Recovery
- Incident Definition (What Is an Incident and What Is an Incident Response).
- Response Team (Incident Response Team).
- Handling Procedure (Step by Step Procedure for Managing Incidents).
- PICERF Methodology (Six Step Approach for Incident Handling).
- Recovery Planning (What is a Disaster Recovery, Disaster Recovery Planning).
- Business Continuity (Business Continuity Planning Process).
- Prevention (Disaster Prevention).