Defending the Perimeter from Cyber Attacks Training

Learning Tree International AB, i Stockholm (+3 orter)
Längd
4 dagar
Pris
30 750 SEK exkl. moms
Längd
4 dagar
Pris
30 750 SEK exkl. moms
Få mer information om utbildningen, arrangörerna svarar oftast inom 48h 👍

Beskrivning av: Defending the Perimeter from Cyber Attacks Training

This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. You will learn how to define and implement security principles, install and customise secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.

  • Basic security knowledge at the level of:
    • Course 468 , System and Network Security Introduction
  • Working knowledge of TCP/IP and client server architecture

Defending the Perimeter from Cyber Attacks Training Delivery Methods

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

Defending the Perimeter from Cyber Attacks Training Course Benefits

  • Fortify your network perimeter to provide an integrated defence
  • Prevent or mitigate the effects of network attacks with a firewall
  • Detect and respond to network attacks with Intrusion Detection and Prevention (IDP)
  • Design, install, and configure secure Virtual Private Networks (VPNs)
  • Mitigate the impact of Denial-of-Service (DoS) attacks

Defending the Perimeter Course Outline

Setting Your Security Objectives

Defining security principles

  • Ensuring data Confidentiality, Integrity and Availability (CIA)
  • Assessing defensive techniques
  • Setting a generic security stance

Developing a security policy

  • Balancing risk with business requirements
  • Identifying your information assurance objectives
  • Choosing security technologies

Deploying a Secure Firewall

Installing a firewall

  • Determining the appropriate firewall type
  • Selecting and hardening the operating system
  • Virtualising the firewall appliance

Configuring a firewall to support outgoing services

  • Supporting simple services: HTTP, SMTP
  • Filtering dangerous content and handling encrypted traffic
  • Managing complex services: VoIP, audio and video

Providing external services securely

  • Implementing publicly accessible servers
  • Building a DMZ architecture
  • Supporting SMTP mail

Allowing access to internal services

  • Customising DNS for firewall architectures
  • Configuring Network Address Translation (NAT)
  • Developing access lists for client server applications

Detecting and Preventing Intrusion

Deploying an IDS

  • Placing Network IDS (NIDS) within your network architecture
  • Operating sensors in stealth mode

Detecting intrusions in the enterprise

  • Designing a multi-layer IDS hierarchy
  • Managing distributed IDS

Interpreting alerts

  • Verifying IDS operation
  • Minimising false positives and negatives
  • Validating IDS events and recognising attacks

Stopping intruders

  • Exploiting IDS active responses
  • Snipping a TCP session
  • Controlling access with a firewall update

Configuring Remote User Virtual Private Networks (VPNs)

Building VPN tunnels

  • Compulsory vs. voluntary tunnels
  • Supporting remote users with layer 2 tunnels
  • Connecting remote sites with layer 3 tunnels

Deploying client software

  • Assessing remote access VPN alternatives
  • Implementing remote user authentication
  • Leveraging Layer 2 Tunnelling Protocol (L2TP)
  • Protecting L2TP tunnels with IPsec Transport Mode

Creating Site-to-Site VPNs

Applying cryptographic protection

  • Ensuring confidentiality with symmetric encryption
  • Exchanging symmetric keys with asymmetric encryption
  • Checking message integrity with hashing
  • Managing digital certificates with PKI

Comparing tunnelling and protection methods

  • Employing VPN concentrators and VPN-capable routers
  • Applying IPsec Tunnel Mode
  • Assessing tunnelling protocols
  • Evaluating VPN topologies

Integrating Perimeter Defences

Reducing the impact of denial-of-service (DoS) attacks

  • Mitigating bombardment attacks
  • Rejecting connection-based attacks with IPSs
  • Blackholing and sinkholing
  • Implementing a DoS Defence System (DDS)
  • Blacklisting attack sites and address ranges

Perimeter architectures

  • Integrating IDS and VPNs with your firewall architecture
  • Positioning externally accessible servers
  • Monitoring and controlling wireless networks

Intresseanmälan

Beställ information

Fyll i formuläret för att få mer information om Defending the Perimeter from Cyber Attacks Training, direkt från arrangören. Det är gratis och inte bindande!

reCAPTCHA logo Den här hemsidan är skyddad av reCAPTCHA och Googles Integritetspolicy och Användarvillkor tillämapas.
Learning Tree International AB
Fleminggatan 7
112 26 Stockholm

Learning Tree International

Learning Tree är ett internationellt utbildningsföretag med över 40 års erfarenhet av att leverera utbildning till yrkesverksamma IT-proffs, projektledare, verksamhetsutvecklare och chefer. Vi erbjuder allt från enstaka kurser till globala utbildningsprogram, och vi hjälper våra kunder att införa hållbara processer som fungerar idag och förbereder...

Läs mer om Learning Tree International AB och visa alla utbildningar.

Highlights