Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Defending the Perimeter from Cyber Attacks

( Duration: 3 Days )

By attending Defending the Perimeter from Cyber Attacks training course, you will learn to:

  • Fortify the network perimeter to provide an integrated defense
  • Prevent or mitigate the effects of network attacks with a firewall
  • Detect and respond to network attacks with Intrusion Detection and Prevention (IDP)
  • Design, install and configure secure Virtual Private Networks
  • Mitigate the impact of Denial-of-Service (DoS) attacks

This Defending the Perimeter from Cyber Attacks workshop is meant for Security professionals who seek the knowledge and skills to fortify the network perimeter to provide an integrated defense.

COURSE AGENDA

1

Setting Your Security Objectives

  • Defining security principles
    • Ensuring data Confidentiality, Integrity and Availability (CIA)
    • Assessing defensive techniques
    • Setting a generic security stance
  • Developing a security policy
    • Balancing risk with business requirements
    • Identifying your information assurance objectives
    • Choosing security technologies
2

Deploying a Secure Firewall

  • Installing a firewall
    • Determining the appropriate firewall type
    • Selecting and hardening the operating system
    • Virtualizing the firewall appliance
  • Configuring a firewall to support outgoing services
    • Supporting simple services: HTTP, SMTP
    • Filtering dangerous content and handling encrypted traffic
    • Managing complex services: VoIP, audio and video
  • Providing external services securely
    • Implementing publicly accessible servers
    • Building a DMZ architecture
    • Supporting SMTP mail
  • Allowing access to internal services
    • Customizing DNS for firewall architectures
    • Configuring Network Address Translation (NAT)
    • Developing access lists for client server applications
3

Detecting and Preventing Intrusion

  • Deploying an IDS
    • Placing Network IDS (NIDS) within your network architecture
    • Operating sensors in stealth mode
  • Detecting intrusions in the enterprise
    • Designing a multi-layer IDS hierarchy
    • Managing distributed IDS
  • Interpreting alerts
    • Verifying IDS operation
    • Minimizing false positives and negatives
    • Validating IDS events and recognizing attacks
  • Stopping intruders
    • Exploiting IDS active responses
    • Snipping a TCP session
    • Controlling access with a firewall update
4

Configuring Remote User Virtual Private Networks (VPNs)

  • Building VPN tunnels
    • Compulsory vs. voluntary tunnels
    • Supporting remote users with layer 2 tunnels
    • Connecting remote sites with layer 3 tunnels
  • Deploying client software
    • Assessing remote access VPN alternatives
    • Implementing remote user authentication
    • Leveraging Layer 2 Tunneling Protocol (L2TP)
    • Protecting L2TP tunnels with IPsec Transport Mode
5

Creating Site-to-Site VPNs

  • Applying cryptographic protection
    • Ensuring confidentiality with symmetric encryption
    • Exchanging symmetric keys with asymmetric encryption
    • Checking message integrity with hashing
    • Managing digital certificates with PKI
  • Comparing tunneling and protection methods
    • Employing VPN concentrators and VPN-capable routers
    • Applying IPsec Tunnel Mode
    • Assessing tunneling protocols
    • Evaluating VPN topologies
6

Integrating Perimeter Defenses

  • Reducing the impact of denial-of-service (DoS) attacks
    • Mitigating bombardment attacks
    • Rejecting connection-based attacks with IPSs
    • Blackholing and sinkholing
    • Implementing a DoS Defense System (DDS)
    • Blacklisting attack sites and address ranges
  • Perimeter architectures
    • Integrating IDS and VPNs with your firewall architecture
    • Positioning externally accessible servers
    • Monitoring and controlling wireless networks

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X