Difference between revisions of "GainCloud Advanced Security Training"

From Business Apps Cloud
Jump to: navigation, search
 
(4 intermediate revisions by one user not shown)
Line 1: Line 1:
 
<p><span style="font-size: small;">Classroom Training Document and Materials eShare:</span></p>
 
<p><span style="font-size: small;">Classroom Training Document and Materials eShare:</span></p>
 
<!--GainCloud eShare Button Code - AJAX Button-->
 
<!--GainCloud eShare Button Code - AJAX Button-->
<div style="width: 160px; padding-left: 20px; text-align: center;"><a style="text-decoration: none;" href="https://www.gaincloud.com/share/viewshare.do?mainsharecode=MS6021021"> <img src="https://www.gaincloud.com/my/htdocs/images/folder_blue_stuffed.png" alt="Cloud based Secure Online Private Share Folder For Software" /> <br /><strong>Training Material eShare</strong></a></div>
+
<div style="width: 160px; padding-left: 20px; text-align: center;"><a style="text-decoration: none;" href="https://www.egaincloud.com/share/viewshare.do?mainsharecode=MS4281281"> <img src="https://www.egaincloud.com/my/htdocs/images/folder_blue_stuffed.png" alt="Cloud based Secure Online Private Share Folder For Software" /> <br /><strong>Training Material eShare</strong></a></div>
 
<!--End Of Button Code-->
 
<!--End Of Button Code-->
<p><span style="font-size: small;"><br /><span style="text-decoration: underline;"><strong>Total Instruction Hours:</strong></span><br />21 hours of Classroom Instructions<br />30 hours of Hands-on Lab<br />9 hours of Testing (in 9 separate Tests)<br />===============================================<br />Net total is 60 hours of curriculum<br />===============================================</span></p>
+
<p><span style="font-size: small;"><br /><span style="text-decoration: underline;"><strong>Total Instruction Hours:</strong></span><br />21 hours of Classroom Instructions<br />30 hours of Hands-on Lab<br />9 hours of Testing (in 9 separate Tests)<br /><br /><strong>Net total is 60 hours of curriculum</strong></span></p>
<p>&nbsp;</p>
+
<p><span style="font-size: small;"><br /></span></p>
 
<p><span style="text-decoration: underline;"><strong><span style="font-size: small;">The Course Curriculum for this Advanced Security Training:</span></strong></span></p>
 
<p><span style="text-decoration: underline;"><strong><span style="font-size: small;">The Course Curriculum for this Advanced Security Training:</span></strong></span></p>
 
<p>&nbsp;</p>
 
<p>&nbsp;</p>
<p><span style="font-size: small;">(3 Hour) [CLASS] Introduction to networks security<br />&nbsp;&nbsp;&nbsp; &nbsp;- Network Concepts <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; IPV4, Device ID, Network cards - hard/soft<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Authentication Factors <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Authentication &amp; Authorization<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; New Authentication Systems <br /><br />(3 Hour) [CLASS] Infrastructure Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Context Aware Firewalls (ASA)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Policy Management <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Object Definition and ACL Management (ASA)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Infrastructure &amp; Security Protocols<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Enterprise Security Products (PDF and Notes)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Perimeter Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; In-Network Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; DNS Security is Corporate #1 Priority<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Identity Management <br /></span></p>
+
<p><span style="font-size: small;">== [CLASS] Introduction to networks security ==<br /></span></p>
 +
<p><span style="font-size: small;">(3 Hour) <br />&nbsp;&nbsp;&nbsp; &nbsp;- Network Concepts <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; IPV4, Device ID, Network cards - hard/soft<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Authentication Factors <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Authentication &amp; Authorization<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; New Authentication Systems</span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>LDAP and Directory Management<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Traditional data storage Vs. Tree structure<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Caching Vs Searching<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Profiling Vs Tabulation<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Active Directory and other common LDAP vendors<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Virtual and Meta</span></p>
 +
<p><span style="font-size: small;"><br /></span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;">== [CLASS] Infrastructure Security ==</span><br />(3 Hour) <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Context Aware Firewalls (ASA)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Policy Management <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Object Definition and ACL Management (ASA)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Infrastructure &amp; Security Protocols<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Enterprise Security Products (PDF and Notes)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Perimeter Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; In-Network Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; DNS Security is Corporate #1 Priority<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Identity Management <br /></span></p>
 
<blockquote>
 
<blockquote>
 
<ul>
 
<ul>
Line 18: Line 22:
 
</ul>
 
</ul>
 
</blockquote>
 
</blockquote>
<p><span style="font-size: small;"><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - LDAP and Directory Management<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Traditional data storage Vs. Tree structure<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Caching Vs Searching<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Profiling Vs Tabulation<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Active Directory and other common LDAP vendors<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Virtual and Meta<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />===================================================================================================================================<br />&nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">(3 Hour) </span>[CLASS] Security Management<br /></span></p>
+
<p><span style="font-size: small;">&nbsp;&nbsp;&nbsp;&nbsp; <br />== <span style="font-size: small;">[CLASS] Security Management ==</span><br /><span style="font-size: small;">(3 Hour) </span><br /></span></p>
<p><span style="font-size: small;"><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Intrusion Prevention<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - All are based on behaviour analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Detection<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - VPN - <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; IPSec Vs SSL<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; RADIUS<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Site-to-Site VPNs<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Wireless Security <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; WEP Vs WPA Vs WPA2<br /></span>&nbsp;&nbsp;&nbsp; <span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Vulnerability Analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Using existing tools<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Without using any software tools</span></span></p>
+
<p><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Intrusion Prevention<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt;&nbsp; </span>VPN<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Wireless Security </span>&nbsp;&nbsp;&nbsp; <span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Vulnerability Analysis<br /></span><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Security Policies<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Corporate Security Policies<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Hackers Hat - breaking corporate security code<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Endpoint Assessments<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Enabling Intrusion Prevention System (IPS)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Best Practices - Cyber-Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Traditional Hacking Techniques<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Monitor telemetry data<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Event Coorelation for alarms<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Risk Analysis and Mitigation<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Review malware signatures<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Viruses &amp; Worms<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Network Trace gathering and analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Review common hacking techniques and kits<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Backdoor<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Botnets<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; DoS and DDoS<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Tunnel Attacks<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; </span></p>
<p><span style="font-size: small;"><span style="font-size: small;">&nbsp;</span><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Security Policies<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Corporate Security Policies<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Hackers Hat - breaking corporate security code<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Endpoint Assessments<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Enabling Intrusion Prevention System (IPS)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Best Practices - Cyber-Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Traditional Hacking Techniques<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Monitor telemetry data<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Event Coorelation for alarms<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Risk Analysis and Mitigation<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Review malware signatures<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Viruses &amp; Worms<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Network Trace gathering and analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Review common hacking techniques and kits<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Backdoor<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Botnets<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; DoS and DDoS<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Tunnel Attacks<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">(3 Hour) </span>[CLASS] Leading Companies and Leading Products - how-to-use, why-to-use, where-to-apply<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Top 3 Products - in-depth<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; 1: - QQ<br /><br /><span style="font-size: small;">(3 Hour) </span>Identification:<br />&nbsp;&nbsp;&nbsp; &gt; 3-[CLASS] Network analysis and deep-dives<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Identify Compromised System<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Isolate Zombie<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Stopping malware<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">(3 Hour) </span>-[CLASS] Intrusion signatures &amp; footprints<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Signature Analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - P32/PDOM screenshots<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - RootKits<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; 1: - QQ<br /><br /><span style="font-size: small;">(3 Hour) </span>[LAB] Prevention - Perimeter Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Introduction<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - PKI - Create cert, sign them, install them, trust them and external providers<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">(3 Hour) </span>[CLASS] Firewalls &amp; Rulesets<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - ACE, ACL, ACI<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - LDAP and Directory Infrastructure<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; 1: - QQ<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">(3 Hour) </span>[LAB] Adaptive Security<br />&nbsp;&nbsp;&nbsp;&nbsp; &gt;&gt; Introduction to Software based security:<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Clamscan, Bayes Algo, Other softwares<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; IPtables<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Software firewal of Linux<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Hardening Kernel and Linux services<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; 1: - QQ<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">(3 Hour)&nbsp; </span>Hardware based security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; IPS<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Firewall<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Shun Hosts<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; 1: - QQ<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;<br /><br /><span style="font-size: small;">(3 Hour) </span>[CLASS] <span style="font-size: small;">Offensive Network Design: </span>Network<br />&nbsp;&nbsp;&nbsp; - Review existing network<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Interview Customer - questions to ask - checklist<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Checklist for Table Of Obervation - recording<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Security checklist for implementation<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Master Checklist for design analysis<br />&nbsp;&nbsp;&nbsp; - Review current architecture<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; First create your proposed topology and artifacts<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Peer review of topo<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Oversight review &amp; Risk Assessment<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; DR and BCP requirements<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Customer Approval &amp; Signoff<br />&nbsp;&nbsp;&nbsp; 1: - QQ<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;"><span style="font-size: small;">(9 Hour)&nbsp; </span></span>[LAB] Appliance Setup <br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1: - Prereq's - Before you begin<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2: - Juniper entry point appliance - SS5<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2: - Cisco entry point appliance - ASA 5505<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2: - Netgear entry point appliance - FVS 318<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2: - IPSec VPN end-to-end setup and configuration<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1: - QQ<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span></span></span>[LAB] Active Monitoing Setup<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Introduction to Netflow Vs. SNMP<br />&nbsp;&nbsp;&nbsp; - Monitoring Web Servers<br />&nbsp;&nbsp;&nbsp; - Monitoring DNS Servers<br />&nbsp;&nbsp;&nbsp; - Monitoring IMAP Servers (Dovecot)<br />&nbsp;&nbsp;&nbsp; - Monitoring Email Gateway (Postfix)<br />&nbsp;&nbsp;&nbsp; - Monitoring from external service providers - pingdom<br />&nbsp;&nbsp;&nbsp; 1: - QQ<br /><br /><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">(4 Hour) </span></span></span></span>[LAB] Active Response Management<br />&nbsp;&nbsp;&nbsp; - Firewall based Block Rules<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Single IP<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Entire Subnet<br />&nbsp;&nbsp;&nbsp; - Reporting Abusive Originating IPs<br />&nbsp;&nbsp;&nbsp; - Blacklist and Backscatterers<br />&nbsp;&nbsp;&nbsp; - Load Balancing Services<br />&nbsp;&nbsp;&nbsp; - Failover Services<br />&nbsp;&nbsp;&nbsp; 1: - QQ<br /><br />========================================================================<br /><br /><br /></span></p>
+
<p><span style="font-size: small;">== <span style="font-size: small;"><span style="font-size: small;"> </span>[CLASS] Leading Companies and Leading Products ==</span><br /><span style="font-size: small;">(3 Hour)</span> </span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>How-to-use, why-to-use, where-to-apply<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Top 3 Products - in-depth</span></p>
 +
<p><span style="font-size: small;"><br /></span></p>
 +
<p>== <span style="font-size: small;">[CLASS] Network analysis and deep-dives ==<br /></span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span>Identification:<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Identify Compromised System<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Isolate Zombie<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Stopping malware<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; </span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;">== [CLASS] Intrusion signatures &amp; footprints ==</span><br /><span style="font-size: small;">(3 Hour) </span>-<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Signature Analysis<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>P32/PDOM screenshots<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>RootKits<br /></span></p>
 +
<p>&nbsp;</p>
 +
<p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Prevention - Perimeter Security ==<br /></span></span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span><br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Introduction<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; P</span>KI - Create cert, sign them, install them, trust them and external providers</span></p>
 +
<p><span style="font-size: small;"><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />== <span style="font-size: small;">[CLASS] Firewalls &amp; Rulesets ==</span><br /><span style="font-size: small;">(3 Hour) </span><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - ACE, ACL, ACI<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - LDAP and Directory Infrastructure<br /></span></p>
 +
<p><span style="font-size: small;"><br /></span></p>
 +
<p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Adaptive Security ==</span> &nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;</span></span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span><br />&nbsp;&nbsp;&nbsp;&nbsp; &gt;&gt; Introduction to Software based security:<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Clamscan, Bayes Algo, Other softwares<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; IPtables<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Software firewal of Linux<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Hardening Kernel and Linux services<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; 1: - QQ<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">(3 Hour)&nbsp; </span>Hardware based security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; IPS<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Firewall<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Shun Hosts<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; 1: - QQ<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;<br /><span style="font-size: small;">== [CLASS] <span style="font-size: small;">Offensive Network Design</span></span> ==<br /><span style="font-size: small;">(3 Hour) </span><br />&nbsp;&nbsp;&nbsp; - Review existing network<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Interview Customer - questions to ask - checklist<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Checklist for Table Of Obervation - recording<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Security checklist for implementation<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Master Checklist for design analysis<br />&nbsp;&nbsp;&nbsp; - Review current architecture<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; First create your proposed topology and artifacts<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Peer review of topo<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Oversight review &amp; Risk Assessment<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; DR and BCP requirements<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Customer Approval &amp; Signoff<br />&nbsp;&nbsp;&nbsp; 1: - QQ</span></p>
 +
<p><span style="font-size: small;"><br /></span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">&nbsp;</span>== [LAB] Appliance Setup ==</span> &nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;"><span style="font-size: small;">&nbsp;</span></span></span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">(9 Hour)&nbsp; </span></span><br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1: - Prereq's - Before you begin<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2: - Juniper entry point appliance - SS5<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2: - Cisco entry point appliance - ASA 5505<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2: - Netgear entry point appliance - FVS 318<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 2: - IPSec VPN end-to-end setup and configuration<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; 1: - QQ<br />&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">&nbsp;</span></span>== [LAB] Active Monitoing Setup == </span></span></span></span></span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">&nbsp;</span>(3 Hour) </span></span></span><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Introduction to Netflow Vs. SNMP<br />&nbsp;&nbsp;&nbsp; - Monitoring Web Servers<br />&nbsp;&nbsp;&nbsp; - Monitoring DNS Servers<br />&nbsp;&nbsp;&nbsp; - Monitoring IMAP Servers (Dovecot)<br />&nbsp;&nbsp;&nbsp; - Monitoring Email Gateway (Postfix)<br />&nbsp;&nbsp;&nbsp; - Monitoring from external service providers - pingdom<br />&nbsp;&nbsp;&nbsp; 1: - QQ<br /><br /><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">== <span style="font-size: small;">[LAB] Active Response Management ==</span></span></span></span></span></span></p>
 +
<p><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">&nbsp;</span>(4 Hour) </span></span></span></span><br />&nbsp;&nbsp;&nbsp; - Firewall based Block Rules<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Single IP<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt; Entire Subnet<br />&nbsp;&nbsp;&nbsp; - Reporting Abusive Originating IPs<br />&nbsp;&nbsp;&nbsp; - Blacklist and Backscatterers<br />&nbsp;&nbsp;&nbsp; - Load Balancing Services<br />&nbsp;&nbsp;&nbsp; - Failover Services<br />&nbsp;&nbsp;&nbsp; 1: - QQ<br /><br /><br /><br /><br /></span></p>

Latest revision as of 16:52, 18 October 2016

Classroom Training Document and Materials eShare:

Cloud based Secure Online Private Share Folder For Software
Training Material eShare


Total Instruction Hours:
21 hours of Classroom Instructions
30 hours of Hands-on Lab
9 hours of Testing (in 9 separate Tests)

Net total is 60 hours of curriculum


The Course Curriculum for this Advanced Security Training:

 

[CLASS] Introduction to networks security


(3 Hour)
     - Network Concepts
        >> IPV4, Device ID, Network cards - hard/soft
        >> Authentication Factors
        >> Authentication & Authorization
        >> New Authentication Systems

        >> LDAP and Directory Management
            >> Traditional data storage Vs. Tree structure
            >> Caching Vs Searching
            >> Profiling Vs Tabulation
            >> Active Directory and other common LDAP vendors
            >> Virtual and Meta


[CLASS] Infrastructure Security


(3 Hour)
        >> Context Aware Firewalls (ASA)
        >> Policy Management
        >> Object Definition and ACL Management (ASA)
        >> Infrastructure & Security Protocols
        >> Enterprise Security Products (PDF and Notes)
        >> Perimeter Security
        >> In-Network Security
        >> DNS Security is Corporate #1 Priority
        >> Identity Management

  • IAM - Unified identity management - self reg, identity lifecycle, provisioning, sync
  • OAM - centralized access management - Authn and Authz - for Web, service-based, mobile,..
  • OID - Centralized data storage & encryption - encrypt data-in-storage & data-in-transit - DLP
  • Admin - Delegated admin, admin-overview, Rule based admin oversight, Re-Certification
  • Audit - Yearly, Quaterly and monthly compliance checks, internal audit and external audits
  • Compliance - Support for SSAE16, SOC1, SOC2, PCI and SOX

    

[CLASS] Security Management </h2>
(3 Hour)
</span></p> <p>        >> Intrusion Prevention
        >>  VPN
        >> Wireless Security
               
        >> Vulnerability Analysis
        >> Security Policies
            >> Corporate Security Policies
            >> Hackers Hat - breaking corporate security code
            >> Endpoint Assessments
            >> Enabling Intrusion Prevention System (IPS)
           
        >> Best Practices - Cyber-Security
            >> Traditional Hacking Techniques
            >> Monitor telemetry data
            >> Event Coorelation for alarms
            >> Risk Analysis and Mitigation
           
        >> Review malware signatures
            >> Viruses & Worms
            >> Network Trace gathering and analysis
           
        >> Review common hacking techniques and kits
            >> Backdoor
            >> Botnets
            >> DoS and DDoS
            >> Tunnel Attacks
           
</p> <p><h2> [CLASS] Leading Companies and Leading Products </h2>
(3 Hour)
</p> <p>        >> How-to-use, why-to-use, where-to-apply
        >> Top 3 Products - in-depth
</p> <p>
</p> <p><h2> [CLASS] Network analysis and deep-dives </h2>
</p> <p>(3 Hour) Identification:
        >> Identify Compromised System
        >> Isolate Zombie
        >> Stopping malware
       
</p> <p><h2> [CLASS] Intrusion signatures & footprints </h2>
(3 Hour) -
        >> Signature Analysis
        >> P32/PDOM screenshots
        >> RootKits
</p> <p> </p> <p><h2> [LAB] Prevention - Perimeter Security </h2>
</p> <p>(3 Hour)
        >> Introduction
        >> PKI - Create cert, sign them, install them, trust them and external providers
</p> <p>
       
<h2> [CLASS] Firewalls & Rulesets </h2>
(3 Hour)
        - ACE, ACL, ACI
        - LDAP and Directory Infrastructure
</p> <p>
</p> <p><h2> [LAB] Adaptive Security </h2>       
 
</p> <p>(3 Hour)
     >> Introduction to Software based security:
        > Clamscan, Bayes Algo, Other softwares
        > IPtables
        > Software firewal of Linux
        > Hardening Kernel and Linux services
        1: - QQ
       
(3 Hour)  Hardware based security
        > IPS
        > Firewall
        > Shun Hosts
        1: - QQ
         
<h2> [CLASS] Offensive Network Design </h2>
(3 Hour)
    - Review existing network
        >> Interview Customer - questions to ask - checklist
        >> Checklist for Table Of Obervation - recording
        >> Security checklist for implementation
        >> Master Checklist for design analysis
    - Review current architecture
        >> First create your proposed topology and artifacts
        >> Peer review of topo
        >> Oversight review & Risk Assessment
        >> DR and BCP requirements
        >> Customer Approval & Signoff
    1: - QQ
</p> <p>
</p> <p> <h2> [LAB] Appliance Setup </h2>               
 
</p> <p>(9 Hour) 
      1: - Prereq's - Before you begin
      2: - Juniper entry point appliance - SS5
      2: - Cisco entry point appliance - ASA 5505
      2: - Netgear entry point appliance - FVS 318
      2: - IPSec VPN end-to-end setup and configuration
      1: - QQ
     
 <h2> [LAB] Active Monitoing Setup </h2>
</p> <p> (3 Hour)
        - Introduction to Netflow Vs. SNMP
    - Monitoring Web Servers
    - Monitoring DNS Servers
    - Monitoring IMAP Servers (Dovecot)
    - Monitoring Email Gateway (Postfix)
    - Monitoring from external service providers - pingdom
    1: - QQ

<h2> [LAB] Active Response Management </h2>
</p> <p> (4 Hour)
    - Firewall based Block Rules
        > Single IP
        > Entire Subnet
    - Reporting Abusive Originating IPs
    - Blacklist and Backscatterers
    - Load Balancing Services
    - Failover Services
    1: - QQ




</p>