Thank you for sending your enquiry! One of our team members will contact you shortly.
Thank you for sending your booking! One of our team members will contact you shortly.
Course Outline
Module 1: Introduction to Network Security for Government
- Network topology; Types of networks and the OSI Model
Module 2: Network Protocols for Government
- Network protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, HTTP
- IP: Attacks and countermeasures
- TCP, UDP: Attacks and countermeasures
- FTP, TFTP, Telnet, SMTP: Vulnerabilities
Module 3: Security Policy for Government
- Definition of a security policy
- Characteristics of an effective security policy
- Structure of a security policy
- Developing and implementing security policies
- Requirements for effective security policies
Module 4: Physical Security for Government
- Physical security threats
- Locks and keys
- TEMPEST
- Fire safety: Fire suppression, gaseous emission systems
- Laptop security: Physical security countermeasures
- Biometric devices
- PC security: Boot access control
Module 5: Network Attacks for Government
- Current statistics on network attacks
- Definitions: Threats, attacks, and exploits
- Classification of hackers and attack types
- Spoofing, spamming, eavesdropping, phishing, war dialing, password cracking
- Web page defacement, SQL injection, wire tapping, buffer overflow
- War driving, war chalking, war flying
- Denial of Service (DoS) attacks and Distributed DoS attacks
Module 6: Intrusion Detection System for Government
- Characteristics of IDS
- Host-based IDS vs. network-based IDS
- IDS detection methods; types of signatures
- Intrusion Prevention System (IPS)
- Differences between IDS and IPS
- IPS tools
Module 7: Firewalls for Government
- Handling threats and security tasks with firewalls
- Protection against hacking
- Centralization and documentation in firewall management
- Multi-layer firewall protection
- Packet filtering and stateful packet filtering
- Multi-firewall DMZ
- Specialty firewalls and reverse firewalls
Module 8: Packet Filtering and Proxy Servers for Government
- Network address translation (NAT)
- Application layer gateway and proxying
- Virtual private networks (VPNs) and the authentication process
Module 9: Bastion Host and Honeypots for Government
- Bastion host configurations
- Honeypots and honeynets
Module 10: Hardening Routers for Government
- Internet work operating systems (IOS)
- Troubleshooting routers
- Hardening a router
- Components of router security
- Router security testing tools
Module 11: Hardening Operating Systems Security for Government
- Windows security features
- Objects and permissions management
- NTFS file system permissions
- Active Directory configurations
- Kerberos authentication and security
- IP security (IPSec)
- Linux security practices
Module 12: Patch Management for Government
- Red Hat Up2date patch management utility installation steps
- Microsoft patch management process and Windows Update Services
- Patch management tools: Qchain
- Patch management tool: Microsoft Baseline Security Analyzer
- Other patch management tools
Module 13: Application Security for Government
- Securing web applications
- IPSec and SSL security protocols
- Writing secure code; best practices
- Remote administration security measures
Module 14: Web Security for Government
- Network devices and design considerations
- Altering network addresses
- Client authorization and secure client transmissions
- Portable applications security
- Malicious code detection techniques
- Browser security settings management
- Common Gateway Interface (CGI)
- Web application input data validation and buffer overflow prevention
Module 15: E-Mail Security for Government
- Components of an email system
- Email protocols (SMTP, POP, IMAP)
- E-mail security risks and threats
- Defensive strategies against e-mail security risks
Module 16: Encryption for Government
- Firewalls implementing encryption
- Maintaining confidentiality through encryption
- Digital certificates and certificate authorities
- Public and private keys, including PGP
- Choosing the appropriate key size
- Analyzing popular encryption schemes, including IPSEC
Module 17: Virtual Private Networks (VPNs) for Government
- VPN tunneling protocols
- PPTP and L2TP
- VPN security measures
Module 18: Wireless Local Area Networks (WLANs) for Government
- Types of wireless networks
- Antenna configurations
- WLAN standards (IEEE 802.11)
- Bluetooth and Ultra Wideband technologies
- WEP description tool (Air Snort, WEPCrack)
- WLAN security measures: WPA, TKIP, WTLS
- EAP methods
- Advanced encryption standards (AES), DES, RSA encryption
- RADIUS; multifactor authentication
- Mobile security through certificates
- Certificate management using PKI
Module 19: Creating Fault Tolerance for Government
- Network security and fault tolerance
- Reasons to create fault tolerance in government networks
- Planning for fault tolerance in network design
- Common reasons for system failure
- Preventive measures for ensuring fault tolerance
Module 20: Incident Response for Government
- Definition of an incident
- Step-by-step procedure for incident response
- Managing incidents effectively
- What constitutes an incident response
- Six-step approach for incident handling (PICERF methodology)
- Incident response team roles and responsibilities
Module 21: Disaster Recovery and Planning for Government
- Definition of disaster recovery
- Disaster recovery planning processes
- Business continuity planning process
- Strategies for disaster prevention
Module 22: Network Vulnerability Assessment for Government
- Vulnerability assessment overview
- Goals of network vulnerability assessments
- Methodology for conducting network vulnerability assessments
- Selecting appropriate vulnerability assessment tools
Requirements
There are no specific prerequisites required to participate in this course for government personnel.
35 Hours
Testimonials (1)
The trainer had an excellent knowledge of fortigate and delivered the content very well. Thanks a lot to Soroush.