Cademy logoCademy Marketplace

Course Images

IP security foundation for engineers

IP security foundation for engineers

  • 30 Day Money Back Guarantee
  • Completion Certificate
  • 24/7 Technical Support

Highlights

  • Delivered Online or In-Person

  • You travel to organiser or they travel to you

  • Redhill

  • Two days

  • All levels

Description

IP security training course description

Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls.

What will you learn
  • Describe:
    Basic security attacks
    RADIUS
    SSL
    IPSec
    VPNs
  • Implement digital certificates
  • Deploy firewalls to protect Web servers and users.
  • Secure Web servers and clients.
IP security training course details
  • Who will benefit:
  • Network administrators.
    Network operators.
    Security auditors

  • Prerequisites:
  • TCP/IP foundation for engineers

  • Duration
  • 2 days

IP security training course contents

  • TCP/IP review
  • Brief overview of the relevant headers.
    Hands on Download software for course, use analyser to capture passwords on the wire.

  • Security review
  • Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response.

  • Security exploits
  • The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats.
    Hands on Use a port scanning tool, use a 'hacking' tool.

  • Firewalls
  • Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses.
    Hands on Set up a firewall and prevent attacks.

  • NAT
  • NAT and PAT, Why use NAT, NAT-ALG, RSIP.

  • Encryption
  • Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures.
    Hands on Run a password-cracking program.

  • Authentication
  • Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS.
    Hands on Using certificates.

  • Web client and server security
  • Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts.
    Hands on Browser security.

  • VPNs and IPSec
  • What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

About The Provider

Tags

Reviews