Network Security Training


Students will be able to identify security breaches in a computer network
Students will be able to discuss major issues concerning computer security.
Students will know how to use standard security tools to locate and fix security leaks in a computer network.
Students will have an understanding of a variety of cryptographic algorithms and protocols underlying network security applications.
Students will have an understanding of system-level security issues.


Major Topics

Security Concepts and Terminology
TCP/IP and OSI Network Security
Access Control Issues (Packet Filters, Firewalls)
Communication Security (OSI Layer Security Protocols)
Security Tools
Cryptography
System Security – Intruders and Viruses
E-mail and Web Security

Introduction

Kali Install

Networking Concept
Network Fundamentals

Network Protocols – ICMP/HTTP/DHCP/DNS Theory

Network Protocols – ICMP/HTTP/DHCP/DNS Lab Using Cisco Packet Tracer

Network Protocols – ARP/FTP/SMTP/IMAP/POP3 Theory

Network Protocols – ARP/FTP/SMTP/IMAP/POP3 Lab using Cisco Packet Tracer

Network Protocols – DHCP+DNS+SMTP+POP3+FTP+HTTP Combined Lab

Network Devices(Router/Switches/bridge/HUB/Brouters/Wi-Fi devices)

Special and Reserved IPv4 Addresses

Host Based Analysis

Windows Based Ananlysis

Linux Based Analysis

End Point Security Technology

Security Monitoring and Attack Methods

Network and Host Telemetry

Types of Attacks and Vulnerablities

Intersubnet IP PACKET ROUTING

Network Address translation

Static Translation

High Availablity

firewall in data center

Virtual firewalls

personal firewalls

secure your router just in a single Command.

RADIUS authentication

TACACS+ SERVER

Resolving IPv6 L3 to L2 MAC ADDRESSES

Learn to Configure the IOS Firewall on cisco router.

DHCP Snooping Attack and Learn how to stop such attacks.

OSPF MD5 authentication

OSPF simple text authentication
EIGRP Authentication
RIP Clear Text Authentication
RIP md5 Authentication

IPSEC site to site vpn on cisco router

configure vpn over routers
proxy server telnet
proxy server ssh
proxy server web
virtual server
proxychain
IP Based Security
Network based Security
Time Based Security
Connection Based Security
Load based Security
IP Per System Based Security
Firewaling

Firewall DMZ

Access Review

Access revocation

Password Management

Password Creation

Password Storage and Password Transmission

Password Reset

Password Synchronization

Network packet capture

tcpdump

wireshark

Host telemetry

Logs from users endpoints

Logs from servers

Security Monitoring and Encryption

Security Monitoring and TOR

Security Monitoring and Peer to Peer communication

Types of Attacks

Social Engineering

backdoors

Code execution

MAN in Middle Attacks

DOS Attacks

DDOS Attacks

Direct DDOS Attacks

Password Attacks

Wireless Attacks

Route manipulation Attacks

Privilege escalation Attacks

Botnets Participating in DDOS Attacks

Reflected DDOS Attacks

ARP cache Poisoning
NetFlow Configuration Lab