Cademy logoCademy Marketplace

Course Images

Cyber security for engineers

Cyber security for engineers

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • 5 days

  • All levels

Description

Cyber security training course description

This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs.

What will you learn
  • Describe:
    - Basic security attacks
    - RADIUS
    - SSL
    - VPNs
  • Deploy firewalls and secure networks
  • Explain how the various technologies involved in an IP VPN work.
  • Describe and implement:
    - L2TP
    - IPsec
    - SSL
    - MPLS, L3, VPNs.
Cyber security training course details
  • Who will benefit:
  • Anyone working in the security field.

  • Prerequisites:
  • TCP/IP foundation for engineers

  • Duration
  • 5 days

Cyber security training course contents

  • Security review
  • Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response.

  • Security exploits
  • IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats.
    Hands on port scanning, use a 'hacking' tool.

  • Client and Server security
  • Windows, Linux, Log files, syslogd, accounts, data security.
    Hands on Server hardening.

  • Firewall introduction
  • What is a firewall? Firewall benefits, concepts.
    HAnds on launching various attacks on a target.

  • Firewall types
  • Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products.
    Hands on Simple personal firewall configuration.

  • Packet filtering firewalls
  • Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering.
    Hands on Configuring packet filtering firewalls.

  • Stateful packet filtering
  • Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception.
    Hands on SPI firewalls.

  • Proxy firewalls
  • Circuit level, application level, SOCKS. Proxy firewall plusses and minuses.
    Hands on Proxy firewalls.

  • Firewall architectures
  • Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP.
    Hands on Resilient firewall architecture.

  • Testing firewalls
  • Configuration checklist, testing procedure, monitoring firewalls, logging, syslog.
    Hands on Testing firewalls.

  • Encryption
  • Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures.
    Hands on Password cracking.

  • Authentication
  • Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS.
    Hands on Using certificates.

  • VPN overview
  • What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages.

  • VPN Tunnelling
  • VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels.

  • L2TP
  • Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling.
    Hands on Implementing a L2TP tunnel.

  • IPsec
  • AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues.
    Hands on Implementing an IPsec VPN.

  • SSL VPNs
  • Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates.
    Hands on Implementing a SSL VPN.

  • MPLS VPNs
  • Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs.
    Hands on Implementing a MPLS L3 VPN.

  • Penetration testing
  • Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology.
    Hands on Hacking tools and countermeasures.

About The Provider

Tags

Reviews