New Horizons Lexington KY Computer Training
New Horizons Computer Learning Center presents
 

Tactical Perimeter Defense On-Site Training

This on-site training class is also available as Public Schedule Seminar.

This course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies

Course Description/Agenda


This course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The course covers the issues every administrator must be familiar with.

At Course Completion:
- Describe the core issues of building a perimeter network defense system.

- Investigate the advanced concepts of the TCP/IP protocol suite.

- Secure routers through hardening techniques and configure Access Control Lists.

- Design and configure multiple firewall technologies.

- Examine and implement IPSec and Virtual Private Networks.

- Design and configure an Intrusion Detection System.

- Secure wireless networks through the use of encryption systems.


Prerequisite(s) or equivalent knowledge:
Security+ Certification
 
Outline:
Lesson 1: Network Defense Fundamentals
Defense fundamentals
Defensive Technologies
Objectives of Access Control
The Impact of Defense
Network Auditing Concepts
Lesson 2: Advanced TCP/IP
TCP/IP Concepts
Analyzing the Three-way Handshake
Capturing and Analyzing IP Datagrams
Capturing and Analyzing ICMP Messages
Capturing and Analyzing TCP Headers
Capturing and Analyzing UDP Headers
Analyzing Packet Fragmentation
Analyzing an Entire Session
Lesson 3: Routers and Access Control Lists
Fundamental Cisco Security
Routing Principles
Removing Protocols and Services
Creating Access Control Lists
Implementing Access Control Lists
Logging Concepts
Lesson 4: Designing Firewalls
Firewall Components
Creating a Firewall Policy
Rule Sets and Packet Filters
Proxy Servers
The Bastion Hosts
The Honeypots
Lesson 5: Configuring Firewalls
Understanding Firewalls
Configuring Microsoft ISA Server 2006
IPTables Concepts
Implementing Firewall Technologies
Lesson 6: Implementing IPSec and VPNs
Internet Protocol Security
IPSec Policy Management
IPSec AH Implementation
Combining AH and ESP in IPSec
VPN Fundamentals
Tunneling Protocols
VPN Design and Architecture
VPN Security
Configuring a VPN
Lesson 7: Designing an Intrusion Detection System
Goals of an Intrusion Detection System
Technologies and Techniques of Intrusion Detection
Host-based Intrusion Detection
Network-based Intrusion Detection
The Analysis
How to use an IDS
What an IDS Cannot Do
Lesson 8: Configuring IDS
Snort Foundations
Snort Installation
Snort as an IDS
Configuring Snort to Use a Database
Running an IDS on Linux
Lesson 9: Securing Wireless Networks
Wireless Networking Fundamentals
Wireless LAN (WLAN) Fundamentals
Wireless Security Solutions
Wireless Auditing
Wireless Trusted Networks

 

More Seminar Information

New Horizons Computer Learning Center
New Horizons Lexington KY Computer Training

Delivery Method

On-Site Training On-Site Training

Also Available As

Seminar Seminar

 
Add to favorites Add to favorites
Email Email this page
 

On-Site Training
Information Request Form

Please complete the form for more information and/or a quote for this on-site class.

Name:

Email

Phone:

City and State

Company:

Number of students:
(at least 10 for consideration)

When do you want to hold the
seminar?

How long would you like for the
seminar?

Additional comments to trainer:

We value your privacy!