This Defending the Perimeter from Cyber Attacks course will teach you to ensure the confidentiality, integrity, and availability of your organization’s information by protecting your communications and data. You will learn how to define and implement security principles, install and customize secure firewalls, build Virtual Private Network (VPN) tunnels, and safeguard your organization’s network perimeter against malicious attacks.
- Basic security knowledge at the level of:
- Course 468, System and Network Security Introduction
- Working knowledge of TCP/IP and client server architecture
Defending the Perimeter from Cyber Attacks Training Delivery Methods
- After-course instructor coaching benefit
- Learning Tree end-of-course exam included
Defending the Perimeter from Cyber Attacks Training Course Benefits
Fortify your network perimeter to provide an integrated defensePrevent or mitigate the effects of network attacks with a firewallDetect and respond to network attacks with Intrusion Detection and Prevention (IDP)Design, install, and configure secure Virtual Private Networks (VPNs)Mitigate the impact of Denial-of-Service (DoS) attacks
Defending the Perimeter Course Outline
Defining security principles
- Ensuring data Confidentiality, Integrity and Availability (CIA)
- Assessing defensive techniques
- Setting a generic security stance
Developing a security policy
- Balancing risk with business requirements
- Identifying your information assurance objectives
- Choosing security technologies
Installing a firewall
- Determining the appropriate firewall type
- Selecting and hardening the operating system
- Virtualizing the firewall appliance
Configuring a firewall to support outgoing services
- Supporting simple services: HTTP, SMTP
- Filtering dangerous content and handling encrypted traffic
- Managing complex services: VoIP, audio and video
Providing external services securely
- Implementing publicly accessible servers
- Building a DMZ architecture
- Supporting SMTP mail
Allowing access to internal services
- Customizing DNS for firewall architectures
- Configuring Network Address Translation (NAT)
- Developing access lists for client server applications
Deploying an IDS
- Placing Network IDS (NIDS) within your network architecture
- Operating sensors in stealth mode
Detecting intrusions in the enterprise
- Designing a multi-layer IDS hierarchy
- Managing distributed IDS
Interpreting alerts
- Verifying IDS operation
- Minimizing false positives and negatives
- Validating IDS events and recognizing attacks
Stopping intruders
- Exploiting IDS active responses
- Snipping a TCP session
- Controlling access with a firewall update
Building VPN tunnels
- Compulsory vs. voluntary tunnels
- Supporting remote users with layer 2 tunnels
- Connecting remote sites with layer 3 tunnels
Deploying client software
- Assessing remote access VPN alternatives
- Implementing remote user authentication
- Leveraging Layer 2 Tunneling Protocol (L2TP)
- Protecting L2TP tunnels with IPsec Transport Mode
Applying cryptographic protection
- Ensuring confidentiality with symmetric encryption
- Exchanging symmetric keys with asymmetric encryption
- Checking message integrity with hashing
- Managing digital certificates with PKI
Comparing tunneling and protection methods
- Employing VPN concentrators and VPN-capable routers
- Applying IPsec Tunnel Mode
- Assessing tunneling protocols
- Evaluating VPN topologies
Reducing the impact of denial-of-service (DoS) attacks
- Mitigating bombardment attacks
- Rejecting connection-based attacks with IPSs
- Blackholing and sinkholing
- Implementing a DoS Defense System (DDS)
- Blacklisting attack sites and address ranges
Perimeter architectures
- Integrating IDS and VPNs with your firewall architecture
- Positioning externally accessible servers
- Monitoring and controlling wireless networks