Call : (+91) 968636 4243
Mail : info@EncartaLabs.com
EncartaLabs

Network Security Essentials

( Duration: 5 Days )

The Network Security Essentials training course is designed to provide Network Administrators with an awareness of security-related issues and the essential skills they need to implement security in a given network. You will learn to work with various protocols, and create security in router-based networks and across different platforms. You will also use some of the techniques that network attackers commonly use to learn on how to best stop them.

By attending Network Security Essentials workshop, delegates will learn to:

  • Identify the basics of network security
  • Define the TCP/IP layered architectures and work with advanced IP addressing protocols and commands
  • Describe and work with IP protocols and packets at various levels
  • Create router security using the functions of Access Control Lists
  • Secure Windows computers, and test security effectiveness
  • Secure Linux computers and test security effectiveness
  • Define the common Internet components and identify techniques used in Web hacking
  • Examine and work with the common techniques used to attack networks and specific operating systems

It is assumed that the Network Administrator will have experience with DOS, Windows (client and server), and Linux environments, and have taken the following courses or have equivalent experience:

This Network Security Essentials class is intended for Network Administrators responsible for maintaining a wide range of network technologies.

COURSE AGENDA

1

Foundations of Network Security

  • The Principles of Network Security
  • Network Security Terminologies
  • Network Security and Data Availability
  • Components of Network Security
  • Network Security Policies
2

Advanced TCP/IP

  • The Concepts of TCP/IP
  • Concepts of TCP
  • The Suite and the Services
  • Internet Protocol Security (IPSec)
  • Internet Protocol version 6 (IPv6)
3

IP Packet Structure

  • Network Monitor
  • The IP Header
  • The TCP Header
  • Connections
  • The UDP Header
  • The ICMP Message
  • Packet Fragmentation
  • Analyze an Entire Session
4

Routing and Access Control Lists

  • The ARP Process
  • Cisco Routing Modes
  • The Routing Process
  • Routing Tables
  • Access Control Lists
  • Implementing ACLs
5

Securing Windows Computers

  • Windows 2016 Infrastructure
  • Windows 2016 Authentication
  • Windows 2016 User and Group Security
  • Windows 2016 Resource Security
  • Windows 2016 Encrypting File System
  • Windows 2016 Network Security
6

Securing Linux Computers

  • Linux Operating System vs. Kernel
  • Linux Administration and Security
  • Key Linux Network Files
  • Key Linux Network Processes
  • Key Linux Network Commands
  • Hardening Linux
  • Portmap and Linux
  • Network File System (NFS) and Linux
  • Network Information Service (NIS) and Linux
7

Security on the Internet and the World Wide Web

  • Components of the Internet
  • The Weak Points of the Internet
  • The Techniques of Web Hacking
  • Methods of Attacking Users
8

Attack Techniques

  • Network Reconnaissance
  • Mapping the Network
  • Sweeping the Network
  • Scanning the Network
  • Viruses, Worms, and Trojan Horses
  • Gaining Control over the System
  • Recording Keystrokes
  • Cracking Encrypted Passwords
  • Reveal Hidden Passwords
  • Social Engineering
  • Case Study: Social Engineering
  • Gaining Unauthorized Access
  • Hiding Evidence of an Attack
  • Performing a Denial of Service

Encarta Labs Advantage

  • One Stop Corporate Training Solution Providers for over 6,000 various courses on a variety of subjects
  • All courses are delivered by Industry Veterans
  • Get jumpstarted from newbie to production ready in a matter of few days
  • Trained more than 50,000 Corporate executives across the Globe
  • All our trainings are conducted in workshop mode with more focus on hands-on sessions

View our other course offerings by visiting https://www.encartalabs.com/course-catalogue-all.php

Contact us for delivering this course as a public/open-house workshop/online training for a group of 10+ candidates.

Top
Notice
X