Network Security Administrator
Course ID
Course Description
Prerequisites
Audience
Course Content
- Course Content
- Fundamentals of Computer Network
- Key elements of network Nodes
- Logical Elements of Network
- Media Access Methods
- Automated Information Systems (AIS)
- Critical information characteristics
- Operations Security (OPSEC)
- Object reuse(computer security)
- Transmission Modes
- Network Topologies
- Network Protocols
- Application Layer Protocols
- Presentation Layer Protocol
- Session Layer Protocol
- Transport Layer Protocols
- Network Layer Protocols
- Data link Layer Protocol
- Hardening Physical Security
- Need for physical security
- Security Statistics
- Physical Security Breach Incidents
- Factors Affecting Physical Security
- Physical Security Threats
- Premises Security
- Electronic Physical Security
- Challenges in Ensuring Physical Security
- Mantrap
- Network Security
- Security awareness
- Functions of Network security administrator
- Communication Security (COMSEC)
- program or functional managers
- security office
- Transmission Security
- Legal Elements
- Countermeasures: cover and deception
- Reporting security violations
- Security Standards Organizations
- Internet Corporation for Assigned Names and Numbers (ICANN)
- International Organization for Standardization (ISO)
- Consultative Committee For Telephone and Telegraphy (CCITT)
- International Telecommunication Union (ITU)
- American National Standards Institute(ANSI)
- Institute Of Electronics and Electrical Engineers(IEEE)
- Electronic Industries Association
- National Center for Standards and Certification Information (NIST)
- World Wide Web Consortium (W3C)
- Web Application Security Consortium (WASC)
- Security Standards
- Introduction to Internet Standards
- Standards Creation Committee
- Internet Standards
- Cabling Standards
- Specification Standards
- Security Policy
- Security Policy overview
- Concept of Security Policy
- Security Awareness Programs
- Vital role of a security policy
- Privacy and Confidentiality
- Security Levels
- Agency Specific AIS and Telecommunications Policies
- National Policy and Guidance
- Incident Handling and Escalation Procedures
- Security operations and life cycle management
- Compliance with Law and Policy
- Transborder encryption issues
- Points To Remember While Writing Security Policy
- Issue-specific Security Policy (ISSP)
- IEEE Standards
- Introduction to IEEE standards
- IEEE LAN Protocol Specification
- Wireless Networking Standards
- Network Security Threats
- Vulnerability, Threats, and Attacks
- Common Vulnerabilities and Exposures
- Smurfing
- Hiding Evidence of an Attack
- Problems Detecting Network Attacks
- Network Scanning Tools
- Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS)
- Intrusion Detection Concepts
- Deployment of IDS
- Types of Signatures
- True/False-Positive/Negative
- Intrusion Prevention System
- IDS vs. IPS
- Intrusion Detection Checklist
- Firewalls
- Security features
- Firewall Operations
- Establishing Rules and Restrictions for your Firewall
- Firewall Configuration Strategies
- Scalability
- Firewall Architecture
- Handling threats and security tasks
- Protection against hacking
- Multi-layer firewall protection
- Firewall deployment strategies
- Specialty firewalls and Reverse firewalls
- Advantages and Disadvantages
- Firewall Log Analysis
- Comparison of Various Firewall Products
- Packet Filtering and Proxy Servers
- Application layer gateway
- Proxy servers
- Bastion Host and Honeypots
- Securing Modems
- Modem Features
- Modem Security
- Modem Attacks and Risks
- Modem Failure Symptoms
- Troubleshooting Modems
- Troubleshooting Network
- A Troubleshooting Methodology
- Troubleshooting Network Devices
- Troubleshooting Wireless Devices
- TCP/IP Troubleshooting Utilities
- Hardening Routers
- Routing Metrics
- Multiple Routing
- Routing Algorithms
- Internet work Operating Systems (IOS)
- IP Routing Configuring IP and IP routing
- Configuration of Routers
- Finger Tool
- Disabling the auxiliary and closing extra interfaces
- BOOTp service
- TCP and UDP small servers
- Hardening a Router
- Filtering Network Traffic
- Access Control List
- Log System Error Messages
- Securing Routers
- Router Commands
- Routing Table Maintenance Protocol (RTMP)
- Components of router security
- Hardening Operating Systems
- BIOS security
- Windows Registry
- Resource Access
- Discretionary Access Control List (DACL)
- Encryption File System
- Windows Network Security
- Kerberos Authentication And Domain Security
- Windows Certificate Authorities
- Desktop Management
- Network Information Services
- Patch Management
- The Patch Concept
- Patch testing
- Patch Monitoring and Management
- Consolidating Patches on Red hat Network
- Red Hat Up2date Patch Management
- Reporting
- Patch Management
- Windows Update Services
- Log Analysis
- Limitations of log files
- Monitoring for Intrusion and Security Event
- Log Analysis
- Log Security
- Application Security
- Application Threats and Counter Measures
- Web Applications
- System Life Cycle Management
- Telecommunications Systems
- Securing Communications
- Transmission security countermeasures
- Embedded Application Security (EMBASSY)
- Secure Coding
- Threat modeling
- Web Security
- Common Threats on Web 2.1. Identity theft
- Identifying Unauthorized Devices
- Restrictive Access
- Network Addresses
- Tracking the Connectivity
- Testing the Traffic Filtering Devices
- Client Authorization
- Input Data Validation
- Browser Security
- Plug-ins
- E-mail Security
- Web Based Versus POP3 E-mail
- Installing WorkgroupMail
- Configuring Outlook Express
- Secure Email
- E-Mail Security Risks
- Tools for E-mail Security
- Authentication: Encryption, Cryptography and Digital Signatures
- VeriSign Authentication
- Encryption Systems
- Cryptography
- Digital Signatures
- Key Management Protocols
- Virtual Private Networks and Remote Networking
- Tunneling
- VPN Security
- Wireless Network Security
- Wireless Technologies
- Wireless Communications
- Service Set IDentifier (SSID)
- Detecting Wireless Network
- Wireless Threats
- WLAN Management
- Wireless Auditing
- DHCP Services
- Trouble Shooting Wireless Network
- Creating Fault Tolerance
- Network Security
- Reasons for Network Failure
- Reasons For System Failure
- Preventive Measures
- Incident Response
- Six Step Approach for Incident Handling (PICERF Methodology)
- Incident Response Team
- Disaster Recovery and Planning
- Backup Site
- Emergency Management
- Disaster Recovery Planning
- Security Planning
- Disaster Recovery Planning Team
- Business Process Inventory
- Risk Analysis
- Business Continuity Planning Process
- Emergency destruction procedures
- Disaster Prevention
- Network Vulnerability Assessment
- Vulnerability Assessment
- Personnel for Network Vulnerability Assessment
- Network vulnerability Assessment methodology
For More Information
For training inquiries, call 850-308-1376
or email us at eramos@gbsi.com
Course Details
Duration - 5 days
Price - $2995.00 USD
(Discounts may apply. Call for more information.)
Acceletrain Collaborative Learning Environment (formerly know as VILT) places industry certified and expert instructors, peers, learners and multi-media components into a "borderless classroom", and interactive learning environment that can span multiple physical locations. VILT combines the benefits of the traditional brick-and-mortar classroom with innovative learning techniques and the cost savings of internet-based training.