Course Outline

Module 1: Introduction to Network Security for Government

  • Network topology; Network types and the OSI Model

Module 2: Network Protocols

  • Network protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, HTTP
  • IP: Attacks and countermeasures
  • TCP, UDP: Attacks and countermeasures
  • FTP, TFTP, Telnet, SMTP: Vulnerabilities

Module 3: Security Policy for Government

  • What is a security policy?
  • Characteristics of an effective security policy
  • Structure of a security policy
  • Developing and implementing security policies
  • Requirements for effective security policies

Module 4: Physical Security

  • Physical security threats
  • Locks and keys
  • TEMPEST
  • Fire safety: Fire suppression, gaseous emission systems
  • Laptop security: Physical security countermeasures
  • Biometric devices
  • PC security: Boot access

Module 5: Network Attacks

  • Current statistics on network attacks for government
  • Defining terms: Threats, attack, and exploit
  • Classification of hackers and attacks
  • Spoofing, spamming, eavesdropping, phishing, war dialing, password cracking
  • Web page defacement, SQL injection, wire tapping, buffer overflow
  • War driving, war chalking, war flying
  • Denial of service (DoS) attacks and distributed DoS attacks

Module 6: Intrusion Detection System

  • Characteristics of intrusion detection systems (IDS)
  • Host-based IDS vs. network-based IDS
  • IDS detection methods; types of signatures
  • Intrusion prevention system (IPS)
  • Differences between IDS and IPS
  • IPS tools for government use

Module 7: Firewalls

  • Handling threats and security tasks
  • Protection against hacking
  • Centralization and documentation of firewall policies
  • Multi-layer firewall protection
  • Packet filtering and stateful packet filtering
  • Multi-firewall DMZ configurations
  • Specialty firewalls and reverse firewalls

Module 8: Packet Filtering and Proxy Servers

  • Network address translation (NAT)
  • Application layer gateway and proxying
  • Virtual private network (VPN) and the authentication process

Module 9: Bastion Host and Honeypots

  • Bastion host configurations
  • Honeypots and honeynets for government use

Module 10: Hardening Routers

  • Internet work operating systems (IOS)
  • Troubleshooting routers
  • Hardening a router for enhanced security
  • Components of router security
  • Router security testing tools

Module 11: Hardening Operating System Security

  • Windows security best practices
  • Objects and permissions management
  • NTFS file system permissions
  • Active Directory configuration
  • Kerberos authentication and security
  • IP Security (IPSec) implementation
  • Linux security measures

Module 12: Patch Management for Government

  • Red Hat Up2date patch management utility installation steps
  • Microsoft patch management process and Windows Update services
  • Patch management tools: Qchain
  • Patch management tool: Microsoft Baseline Security Analyzer (MBSA)
  • Other patch management tools for government use

Module 13: Application Security

  • Securing web applications for government
  • IPSec and SSL security protocols
  • Writing secure code: Best practices
  • Remote administration security measures

Module 14: Web Security

  • Network devices and design for web security
  • Altering network addresses for enhanced security
  • Client authorization and secure client transmissions
  • Portable applications and their security implications
  • Malicious code detection methods
  • Browser security settings configuration
  • Common Gateway Interface (CGI) security considerations
  • Web application input data validation and buffer overflow prevention

Module 15: E-Mail Security for Government

  • Components of an email system
  • Email protocols and their security implications
  • E-mail security risks and vulnerabilities
  • Defending against e-mail security risks in government networks

Module 16: Encryption for Government

  • Firewalls implementing encryption protocols
  • Maintaining confidentiality through encryption
  • Digital certificates and their role in secure communications
  • Public and private keys, including PGP
  • Choosing the appropriate size of encryption keys
  • Analyzing popular encryption schemes, including IPSEC

Module 17: Virtual Private Networks (VPNs)

  • VPN tunneling protocols for government use
  • PPTP and L2TP configurations
  • Ensuring VPN security in government networks

Module 18: Wireless Local Area Networks (WLANs)

  • Antenna types and configurations
  • WLAN standards for government use
  • Bluetooth and Ultra Wideband technologies
  • WEP description tool (Air Snort and WEPCrack)
  • WLAN security measures: WPA, TKIP, WTLS
  • EAP methods for secure authentication
  • Advanced encryption standards (AES), DES, RSA encryption
  • RADIUS server integration
  • Multifactor authentication techniques
  • Mobile security through certificates
  • Certificate management using PKI for government networks

Module 19: Creating Fault Tolerance in Government Networks

  • Network security and fault tolerance principles
  • Reasons for creating fault tolerance in government systems
  • Planning for fault tolerance in network design
  • Common reasons for system failure
  • Preventive measures to enhance fault tolerance

Module 20: Incident Response for Government

  • Defining an incident in the context of government networks
  • Step-by-step procedure for incident response
  • Managing incidents effectively
  • Incident response process overview
  • Six-step approach for incident handling (PICERF methodology)
  • Forming and managing an incident response team

Module 21: Disaster Recovery and Planning for Government

  • Understanding disaster recovery in government networks
  • Developing a comprehensive disaster recovery plan
  • Business continuity planning process for government agencies
  • Strategies for preventing disasters in government IT infrastructure

Module 22: Network Vulnerability Assessment for Government

  • Vulnerability assessment principles and practices
  • Goals of network vulnerability assessments
  • Methodology for conducting network vulnerability assessments in government
  • Selecting appropriate vulnerability assessment tools for government use

Requirements

There are no specific prerequisites required to participate in this course for government personnel.

 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories