Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Endpoint Security and Network Access Control

( Duration: 3 Days )

The Endpoint Security and Network Access Control training course provides skills to control admission, security status and configuration of all endpoints in an organization.

By attending Endpoint Security and Network Access Control workshop, delegates will learn to:

  • Enforce security policies to protect sensitive data from internal and external threats
  • Deploy Network Access Control to prevent malware contamination
  • Implement Data Loss Prevention (DLP) through host-based IDS/IPS and endpoint encryption
  • Regulate USB devices and optimize anti-malware

This Endpoint Security and Network Access Control class is intended for Security professionals seeking to enforce security policies for the protection of sensitive data and assets from internal and external threats. Knowledge at the level of the course, System and Network Security Introduction, is required.

COURSE AGENDA

1

Introduction to Endpoint Security

  • Internal defenses vs. perimeter defenses
    • Defining a holistic security posture
    • Assessing threats from client-side and internal attacks
    • Shifting the paradigm from a fortress mentality
  • Establishing a secure internal architecture
    • Instituting a risk-based access control policy
    • Choosing guest access strategies
    • Regulating, monitoring and controlling network traffic
2

Establishing VLANs to Isolate Traffic

  • Developing a VLAN strategy
    • Deciding on the number and types of VLANs
    • Configuring VLAN trunking
    • Managing VLAN access centrally
  • Segregating and isolating traffic
    • Restricting access with port security
    • Setting up quarantine and guest VLANs
    • Managing port security violations
3

Implementing Network Access Control (NAC)

  • Installing a NAC server
    • Implementing and authenticating with EAP
    • Leveraging VLAN infrastructure
  • Securing access with 802.1X
    • Configuring authentication agents
    • Deploying certificates and RADIUS servers
    • Denying rogue devices
4

Establishing Policy Servers and Repositories

  • Implementing policy-based access control
    • Configuring system health requirements
    • Creating a Bring Your Own Devices (BYODs) policy
  • Managing patches and anti-malware updates
    • Establishing software repositories
    • Pushing OS and application patches to clients
  • Monitoring and enforcing endpoint security
    • Checking system health against policy
    • Validating pre-connect and post-connect profiles
    • Quarantining and remediating noncompliant devices
5

Managing Confidentiality for Data at Rest

  • Establishing an encryption policy
    • Handling mobile devices and removable media
    • Integrating encryption with Data Loss Prevention (DLP)
  • Implementing encryption
    • Leveraging PKI to generate corporate recovery keys
    • Enforcing full and partial disk encryption for endpoints
6

Preventing and Detecting Data Exfiltration

  • Developing a data loss strategy
    • Permitting required traffic and denying dangerous traffic
    • Configuring enterprise host firewalls
    • Regulating attached USB and portable devices
  • Monitoring and detecting data leakage
    • Preventing covert tunnels within DNS and HTTP(S) traffic
    • Preventing Personally Identifiable Information (PII) leaks
    • Identifying attempts to steal data
7

Implementing Anti-Malware Defenses

  • Deploying anti-malware
    • Pushing defensive software to endpoints
    • Establishing internal anti-malware signature update servers
    • Managing mobile and remote users
  • Managing enterprise anti-malware configuration
    • Configuring scanning policies
    • Determining responses to infection alerts
    • Securing anti-malware configurations
  • Deploying host-based IDS/IPS
    • Monitoring host processes
    • Deciding among deployment options
8

Reporting and Compliance Checking

  • Responding to and mitigating attacks
    • Assessing incidence response strategies
    • Developing mitigation and containment strategies
  • Demonstrating organizational compliance
    • Generating reports for compliant and noncompliant systems
    • Complying with government regulations
    • Tracking policy effectiveness
    • Producing policy violation reports

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X