Network Security Essentials
Overview
This course covers the (ISC)2 Common Body of Knowledge (CBK) and evaluates real world. This course covers the basic operating characteristics and risks associated with LANs, WANs, client/server, and other forms of networking and distributed computing architectures. It includes best practices for securing and auditing network applications, interconnection devices and remote access, and perimeter security services. Participants map and organize the use of built-in and add-on tools to security policy and audit requirements to determine the essential topics that must be addressed in compliance and risk management, security administration standards and procedures, and audit programs. The course also includes checklists at the end of each control-related section.
Why you should take this course
For users with an introductory knowledge of this topic, and are searching for additional information and its application.
Here are the topics we'll cover.
-
Defining the Distributed Information Technology Environment
- Defining a Network
- Network Terminology
- Computing Models
- Shared Data Networks
- Client Server Computing
- Peer-to-Peer Applications
- Defining the Scope of Network Security and Audit Programs
-
Network Standards and Protocols
- Definition of a Protocol
- Network Communication Standards
- Rules for Communications
- Open Systems Interconnection (OSI) Model
- Common Network Protocols
- Transmission Control Protocol/Internet Protocol (TCP/IP)
- Analysis of OSI Layers
- IEEE 802 Wired and Wireless Standards
- Geographical Network Delineation: LAN, WAN
- Untangling the “Nets”: Internet, Intranets, Extranets
- Network Security Safeguards
-
Network Media Access Technologies: Local Area Networks (LANs) and Wide Area Networks (WANs)
- Network Transmission Media
- Network Topologies
- Wireless LANs
- WAN and Internet Connections
- Switching Techniques
- Leased Digital Line Services
- Residential Broadband
-
Network Interconnection Devices
- Positioning Network Devices in the OSI Reference Model
- Network Interconnection Devices – Layers 1-3
- Network Domains, Virtual LANs and Segmentation
- Network Interconnection Devices – Layers 4-7
- Network Device Management/Maintenance Port Access
- Simple Network Management Protocol (SNMP)
- Enterprise Authentication Systems
- Network Device Audit Checklist
- Security and Audit Tools
-
Network Host Services Security
- Common Server Vulnerabilities
- Server Access Control Architecture
- System Policies
- Security Health Checks
- TCP/IP Application Audits
- Network File Share Security
- Remote Control Programs
- Network Printing Device Security
- Server Security Audit Checklist
- Network and Audit Tools
-
Address Management and Directory Services Security
- Network Address Management: Dynamic Host Configuration Protocol (DHCP)
- Overview of Directory Services
- Domain Name System (DNS)
- Lightweight Directory Access Protocol (LDAP) Directories
- Audit Checklist: LDAP, DNS
- Security and Audit Tools
-
Network Perimeter Security
- Hacker Intrusion Objectives
- Objectives of Network Perimeter Security
- Network Perimeter Security Strategies
- Demilitarized Zone (DMZ) Networks
- Designing and Locating Warning Banners
- Firewall Policies and Positioning
- Intrusion Detection/Prevention Systems (IDS/IPS)
- Virtual Private Networks (VPNs) and Secure Sessions
- Remote User Authentication
- Audit Checklists
- Security and Audit Tools
-
Network Security Risk Analysis
- How to Secure Our Networks
- Network Security Risk Analysis
- Identifying ad Categorizing the Assets
- Tracking Network Security Vulnerabilities
- Network Vulnerability Testing
- Defining a Network Security Strategy
- Security and Audit Tools
Learning Style
Level
Who this course is for
NASBA Certified CPE
Field of Study
Length of course
Advanced Preparation
Here are the learning objectives we'll cover
- Identify key components of Information Technology (IT) in today’s network
- Define a network security strategy and associated policies.
- Identify network security threats and vulnerabilities.
- Evaluate built-in and add-on security tools.
- Formulate network auditing, vulnerability testing and tool selection strategies.
- Locate sources of information and tools.