Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Module 1: Introduction to Network Security for Government
- Network topology; Network types and the OSI Model
Module 2: Network Protocols
- Network protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, HTTP
- IP: Attacks and countermeasures
- TCP, UDP: Attacks and countermeasures
- FTP, TFTP, Telnet, SMTP: Vulnerabilities
Module 3: Security Policy for Government
- What is a security policy?
- Characteristics of an effective security policy
- Structure of a security policy
- Developing and implementing security policies
- Requirements for effective security policies
Module 4: Physical Security
- Physical security threats
- Locks and keys
- TEMPEST
- Fire safety: Fire suppression, gaseous emission systems
- Laptop security: Physical security countermeasures
- Biometric devices
- PC security: Boot access
Module 5: Network Attacks
- Current statistics on network attacks for government
- Defining terms: Threats, attack, and exploit
- Classification of hackers and attacks
- Spoofing, spamming, eavesdropping, phishing, war dialing, password cracking
- Web page defacement, SQL injection, wire tapping, buffer overflow
- War driving, war chalking, war flying
- Denial of service (DoS) attacks and distributed DoS attacks
Module 6: Intrusion Detection System
- Characteristics of intrusion detection systems (IDS)
- Host-based IDS vs. network-based IDS
- IDS detection methods; types of signatures
- Intrusion prevention system (IPS)
- Differences between IDS and IPS
- IPS tools for government use
Module 7: Firewalls
- Handling threats and security tasks
- Protection against hacking
- Centralization and documentation of firewall policies
- Multi-layer firewall protection
- Packet filtering and stateful packet filtering
- Multi-firewall DMZ configurations
- Specialty firewalls and reverse firewalls
Module 8: Packet Filtering and Proxy Servers
- Network address translation (NAT)
- Application layer gateway and proxying
- Virtual private network (VPN) and the authentication process
Module 9: Bastion Host and Honeypots
- Bastion host configurations
- Honeypots and honeynets for government use
Module 10: Hardening Routers
- Internet work operating systems (IOS)
- Troubleshooting routers
- Hardening a router for enhanced security
- Components of router security
- Router security testing tools
Module 11: Hardening Operating System Security
- Windows security best practices
- Objects and permissions management
- NTFS file system permissions
- Active Directory configuration
- Kerberos authentication and security
- IP Security (IPSec) implementation
- Linux security measures
Module 12: Patch Management for Government
- Red Hat Up2date patch management utility installation steps
- Microsoft patch management process and Windows Update services
- Patch management tools: Qchain
- Patch management tool: Microsoft Baseline Security Analyzer (MBSA)
- Other patch management tools for government use
Module 13: Application Security
- Securing web applications for government
- IPSec and SSL security protocols
- Writing secure code: Best practices
- Remote administration security measures
Module 14: Web Security
- Network devices and design for web security
- Altering network addresses for enhanced security
- Client authorization and secure client transmissions
- Portable applications and their security implications
- Malicious code detection methods
- Browser security settings configuration
- Common Gateway Interface (CGI) security considerations
- Web application input data validation and buffer overflow prevention
Module 15: E-Mail Security for Government
- Components of an email system
- Email protocols and their security implications
- E-mail security risks and vulnerabilities
- Defending against e-mail security risks in government networks
Module 16: Encryption for Government
- Firewalls implementing encryption protocols
- Maintaining confidentiality through encryption
- Digital certificates and their role in secure communications
- Public and private keys, including PGP
- Choosing the appropriate size of encryption keys
- Analyzing popular encryption schemes, including IPSEC
Module 17: Virtual Private Networks (VPNs)
- VPN tunneling protocols for government use
- PPTP and L2TP configurations
- Ensuring VPN security in government networks
Module 18: Wireless Local Area Networks (WLANs)
- Antenna types and configurations
- WLAN standards for government use
- Bluetooth and Ultra Wideband technologies
- WEP description tool (Air Snort and WEPCrack)
- WLAN security measures: WPA, TKIP, WTLS
- EAP methods for secure authentication
- Advanced encryption standards (AES), DES, RSA encryption
- RADIUS server integration
- Multifactor authentication techniques
- Mobile security through certificates
- Certificate management using PKI for government networks
Module 19: Creating Fault Tolerance in Government Networks
- Network security and fault tolerance principles
- Reasons for creating fault tolerance in government systems
- Planning for fault tolerance in network design
- Common reasons for system failure
- Preventive measures to enhance fault tolerance
Module 20: Incident Response for Government
- Defining an incident in the context of government networks
- Step-by-step procedure for incident response
- Managing incidents effectively
- Incident response process overview
- Six-step approach for incident handling (PICERF methodology)
- Forming and managing an incident response team
Module 21: Disaster Recovery and Planning for Government
- Understanding disaster recovery in government networks
- Developing a comprehensive disaster recovery plan
- Business continuity planning process for government agencies
- Strategies for preventing disasters in government IT infrastructure
Module 22: Network Vulnerability Assessment for Government
- Vulnerability assessment principles and practices
- Goals of network vulnerability assessments
- Methodology for conducting network vulnerability assessments in government
- Selecting appropriate vulnerability assessment tools for government use
Requirements
There are no specific prerequisites required to participate in this course for government personnel.
35 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.