Course Outline

Module 1: Introduction to Network Security for Government

  • Network topology; Types of networks and the OSI Model

Module 2: Network Protocols for Government

  • Network protocols: SLIP, PPP, ARP, RARP, IGMP, ICMP, SNMP, HTTP
  • IP: Attacks and countermeasures
  • TCP, UDP: Attacks and countermeasures
  • FTP, TFTP, Telnet, SMTP: Vulnerabilities

Module 3: Security Policy for Government

  • Definition of a security policy
  • Characteristics of an effective security policy
  • Structure of a security policy
  • Developing and implementing security policies
  • Requirements for effective security policies

Module 4: Physical Security for Government

  • Physical security threats
  • Locks and keys
  • TEMPEST
  • Fire safety: Fire suppression, gaseous emission systems
  • Laptop security: Physical security countermeasures
  • Biometric devices
  • PC security: Boot access control

Module 5: Network Attacks for Government

  • Current statistics on network attacks
  • Definitions: Threats, attacks, and exploits
  • Classification of hackers and attack types
  • Spoofing, spamming, eavesdropping, phishing, war dialing, password cracking
  • Web page defacement, SQL injection, wire tapping, buffer overflow
  • War driving, war chalking, war flying
  • Denial of Service (DoS) attacks and Distributed DoS attacks

Module 6: Intrusion Detection System for Government

  • Characteristics of IDS
  • Host-based IDS vs. network-based IDS
  • IDS detection methods; types of signatures
  • Intrusion Prevention System (IPS)
  • Differences between IDS and IPS
  • IPS tools

Module 7: Firewalls for Government

  • Handling threats and security tasks with firewalls
  • Protection against hacking
  • Centralization and documentation in firewall management
  • Multi-layer firewall protection
  • Packet filtering and stateful packet filtering
  • Multi-firewall DMZ
  • Specialty firewalls and reverse firewalls

Module 8: Packet Filtering and Proxy Servers for Government

  • Network address translation (NAT)
  • Application layer gateway and proxying
  • Virtual private networks (VPNs) and the authentication process

Module 9: Bastion Host and Honeypots for Government

  • Bastion host configurations
  • Honeypots and honeynets

Module 10: Hardening Routers for Government

  • Internet work operating systems (IOS)
  • Troubleshooting routers
  • Hardening a router
  • Components of router security
  • Router security testing tools

Module 11: Hardening Operating Systems Security for Government

  • Windows security features
  • Objects and permissions management
  • NTFS file system permissions
  • Active Directory configurations
  • Kerberos authentication and security
  • IP security (IPSec)
  • Linux security practices

Module 12: Patch Management for Government

  • Red Hat Up2date patch management utility installation steps
  • Microsoft patch management process and Windows Update Services
  • Patch management tools: Qchain
  • Patch management tool: Microsoft Baseline Security Analyzer
  • Other patch management tools

Module 13: Application Security for Government

  • Securing web applications
  • IPSec and SSL security protocols
  • Writing secure code; best practices
  • Remote administration security measures

Module 14: Web Security for Government

  • Network devices and design considerations
  • Altering network addresses
  • Client authorization and secure client transmissions
  • Portable applications security
  • Malicious code detection techniques
  • Browser security settings management
  • Common Gateway Interface (CGI)
  • Web application input data validation and buffer overflow prevention

Module 15: E-Mail Security for Government

  • Components of an email system
  • Email protocols (SMTP, POP, IMAP)
  • E-mail security risks and threats
  • Defensive strategies against e-mail security risks

Module 16: Encryption for Government

  • Firewalls implementing encryption
  • Maintaining confidentiality through encryption
  • Digital certificates and certificate authorities
  • Public and private keys, including PGP
  • Choosing the appropriate key size
  • Analyzing popular encryption schemes, including IPSEC

Module 17: Virtual Private Networks (VPNs) for Government

  • VPN tunneling protocols
  • PPTP and L2TP
  • VPN security measures

Module 18: Wireless Local Area Networks (WLANs) for Government

  • Types of wireless networks
  • Antenna configurations
  • WLAN standards (IEEE 802.11)
  • Bluetooth and Ultra Wideband technologies
  • WEP description tool (Air Snort, WEPCrack)
  • WLAN security measures: WPA, TKIP, WTLS
  • EAP methods
  • Advanced encryption standards (AES), DES, RSA encryption
  • RADIUS; multifactor authentication
  • Mobile security through certificates
  • Certificate management using PKI

Module 19: Creating Fault Tolerance for Government

  • Network security and fault tolerance
  • Reasons to create fault tolerance in government networks
  • Planning for fault tolerance in network design
  • Common reasons for system failure
  • Preventive measures for ensuring fault tolerance

Module 20: Incident Response for Government

  • Definition of an incident
  • Step-by-step procedure for incident response
  • Managing incidents effectively
  • What constitutes an incident response
  • Six-step approach for incident handling (PICERF methodology)
  • Incident response team roles and responsibilities

Module 21: Disaster Recovery and Planning for Government

  • Definition of disaster recovery
  • Disaster recovery planning processes
  • Business continuity planning process
  • Strategies for disaster prevention

Module 22: Network Vulnerability Assessment for Government

  • Vulnerability assessment overview
  • Goals of network vulnerability assessments
  • Methodology for conducting network vulnerability assessments
  • Selecting appropriate vulnerability assessment tools

Requirements

There are no specific prerequisites required to participate in this course for government personnel.

 35 Hours

Number of participants


Price per participant

Testimonials (1)

Upcoming Courses

Related Categories