RKG Logo training-ITBiz
RKG Logo
Home Courses Fees Schedule REGISTER NOW Corporate Training Locations
ITBiz
columtop
Microsoft Office Tools
Adobe Acrobat Courses
SharePoint Training
Microsoft Dynamics
Social Media Courses
Project Management
Application Devp Tools
Oracle Developer Tools
Data Warehouse & BI
Data Base & System Admin
Programming Languages
Reporting Tools
Networking & Security
Web Technologies
BootCamps
Medical Records
Business Skills
ERP Training
Corporate Training On-Site
columnbottom
ITBiz
columnbottom
System Security & Network
System Security & Network
System Security & Network - Introduction
 
Software Version Red Hat Linux 5 and Windows Servers
Course Duration 4 Days
Course Type Class Room and Instructor-Led On-Line (E-Learning) Hands-On Training
Course Overview In today's Internet-dependent business environment, organizations must link their systems across enterprise-wide and virtual private networks, as well as connect mobile users. Each connection increases exposure to customers, competitors and hackers, magnifying vulnerability to attack. In this course, you learn how to analyze risks to your networks and the steps needed to select and deploy the appropriate countermeasures to reduce your exposure to network threats. Exercises and workshops provide you with experience analyzing system and network security. Activities include:
  • Cracking passwords using rainbow tables
  • Scanning systems with Microsoft Baseline Security Analyzer (MBSA)
  • Restricting computer access with biometrics
  • Preventing unwanted network access with a personal firewall
  • Encrypting and signing important data
  • Discovering security best practices
Intended Audience for this course This course is designed for IT professionals who want to build network and security administration skills in networking and security management.
Course Topics
Building a Secure Organization
  • Real threats that impact security
  • Hackers inside and out
  • Eavesdropping
  • Spoofing
  • Sniffing
  • Trojan horses
  • Viruses
  • Wiretaps
A security policy: the foundation of your protection
  • Defining your information assurance objectives
  • Assessing your exposure
A Cryptography Primer
  • Securing data with symmetric encryption
  • Choosing your algorithm: DES, AES, RC4 and others
  • Assessing key length and key distribution
Solving key distribution issues with asymmetric encryption
  • Generating keys
  • Encrypting with RSA
  • PGP and GnuPG
  • Evaluating Web of Trust and PKI
Ensuring integrity with hashes
  • Hashing with MD5 and SHA
  • Protecting data in transit
  • Building the digital signature
Verifying User and Host Identity
  • Assessing traditional static password schemes
  • Creating a good quality password policy to prevent password guessing and cracking
  • Protecting against social engineering attacks
  • Encrypting passwords to mitigate the impact of password sniffing
Authenticating hosts
  • Shortcomings of IP addresses
  • Address-spoofing issues and countermeasures
  • Solutions for wireless networks
Preventing System Intrusions
  • Discovering system vulnerabilities
  • Searching for operating system holes
  • Discovering file permission issues
  • Limiting access via physical security
Encrypting files for confidentiality
  • Encryption with application-specific tools
  • Recovering encrypted data
Hardening the operating system
  • Locking down user accounts
  • Securing administrator's permissions
  • Protecting against viruses
Guarding Against Network Intrusions
  • Scanning for vulnerabilities
  • Restricting access to critical services
  • Preventing buffer overflows
Reducing denial-of-service (DoS) attacks
  • Securing DNS
  • Limiting the impact of common attacks
Deploying firewalls to control network traffic
  • Analyzing shortcomings of stateless packet filters
  • Contrasting stateful packet filters with application proxies
  • Preventing intrusions with filters
Building network firewalls
  • Evaluating firewall features
  • Selecting an architecture and a personal firewall
Ensuring Network Confidentiality
    Threats from the LAN
  • Sniffing the network
  • Mitigating threats from connected hosts
  • Partitioning the network to prevent data leakage
  • Identifying wireless LAN vulnerabilities
  • Confidentiality on external connections
  • Ensuring confidentiality with encryption
  • Securing data-link layer with PPTP and L2TP
  • Middleware information assurance with SSL and TLS
  • Deploying SSH (the Secure Shell)
Protecting data with IPsec
  • Authenticating remote locations
  • Tunneling traffic between sites
  • Exchanging keys
Managing Your Organization's Security
  • Developing a security plan
  • Responding to incidents
  • Enumerating the six critical steps

Enroll Online   

Live Chat
Enroll Online
Enroll By Fax
Fee & Schedule
Send Message
Testimonials
ITBiz
columtop
columnbottom
ITBiz
Follow us on .....
ITBiz
For further information call 949-387-3772 or FAX 949-681-8247 or email to info@SONUtraining.com
SONU Training is the training wing of RKG Technologies Inc
Disclaimer: RKG Technologies is not linked with Microsoft, Oracle, Adobe, IBM or any other software company we provide training
Copyright © 2004 RKG Technologies Inc. All rights reserved.