Difference between revisions of "GainCloud Advanced Security Training"

From Business Apps Cloud
Jump to: navigation, search
Line 1: Line 1:
 
<p><span style="font-size: small;">Classroom Training Document and Materials eShare:</span></p>
 
<p><span style="font-size: small;">Classroom Training Document and Materials eShare:</span></p>
 
<!--GainCloud eShare Button Code - AJAX Button-->
 
<!--GainCloud eShare Button Code - AJAX Button-->
<div style="width: 160px; padding-left: 20px; text-align: center;"><a style="text-decoration: none;" href="https://www.gaincloud.com/share/viewshare.do?mainsharecode=MS6021021"> <img src="https://www.gaincloud.com/my/htdocs/images/folder_blue_stuffed.png" alt="Cloud based Secure Online Private Share Folder For Software" /> <br /><strong>Training Material eShare</strong></a></div>
+
<div style="width: 160px; padding-left: 20px; text-align: center;"><a style="text-decoration: none;" href="https://www.gaincloud.com/share/viewshare.do?mainsharecode=MS4281281"> <img src="https://www.gaincloud.com/my/htdocs/images/folder_blue_stuffed.png" alt="Cloud based Secure Online Private Share Folder For Software" /> <br /><strong>Training Material eShare</strong></a></div>
 
<!--End Of Button Code-->
 
<!--End Of Button Code-->
 
<p><span style="font-size: small;"><br /><span style="text-decoration: underline;"><strong>Total Instruction Hours:</strong></span><br />21 hours of Classroom Instructions<br />30 hours of Hands-on Lab<br />9 hours of Testing (in 9 separate Tests)<br /><br /><strong>Net total is 60 hours of curriculum</strong></span></p>
 
<p><span style="font-size: small;"><br /><span style="text-decoration: underline;"><strong>Total Instruction Hours:</strong></span><br />21 hours of Classroom Instructions<br />30 hours of Hands-on Lab<br />9 hours of Testing (in 9 separate Tests)<br /><br /><strong>Net total is 60 hours of curriculum</strong></span></p>
Line 23: Line 23:
 
</blockquote>
 
</blockquote>
 
<p><span style="font-size: small;">&nbsp;&nbsp;&nbsp;&nbsp; <br />== <span style="font-size: small;">[CLASS] Security Management ==</span><br /><span style="font-size: small;">(3 Hour) </span><br /></span></p>
 
<p><span style="font-size: small;">&nbsp;&nbsp;&nbsp;&nbsp; <br />== <span style="font-size: small;">[CLASS] Security Management ==</span><br /><span style="font-size: small;">(3 Hour) </span><br /></span></p>
<p><span style="font-size: small;"><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Intrusion Prevention<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - All are based on behaviour analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Detection<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - VPN - <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; IPSec Vs SSL<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; RADIUS<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Site-to-Site VPNs<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Wireless Security <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; WEP Vs WPA Vs WPA2<br /></span>&nbsp;&nbsp;&nbsp; <span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Vulnerability Analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Using existing tools<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Without using any software tools</span></span></p>
+
<p><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Intrusion Prevention<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt;&nbsp; </span>VPN<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Wireless Security </span>&nbsp;&nbsp;&nbsp; <span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Vulnerability Analysis<br /></span><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Security Policies<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Corporate Security Policies<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Hackers Hat - breaking corporate security code<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Endpoint Assessments<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Enabling Intrusion Prevention System (IPS)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Best Practices - Cyber-Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Traditional Hacking Techniques<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Monitor telemetry data<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Event Coorelation for alarms<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Risk Analysis and Mitigation<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Review malware signatures<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Viruses &amp; Worms<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Network Trace gathering and analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Review common hacking techniques and kits<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Backdoor<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Botnets<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; DoS and DDoS<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Tunnel Attacks<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; </span></p>
<p><span style="font-size: small;"><span style="font-size: small;">&nbsp;</span><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Security Policies<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Corporate Security Policies<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Hackers Hat - breaking corporate security code<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Endpoint Assessments<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Enabling Intrusion Prevention System (IPS)<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Best Practices - Cyber-Security<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Traditional Hacking Techniques<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Monitor telemetry data<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Event Coorelation for alarms<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Risk Analysis and Mitigation<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Review malware signatures<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Viruses &amp; Worms<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Network Trace gathering and analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Review common hacking techniques and kits<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Backdoor<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Botnets<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; DoS and DDoS<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; Tunnel Attacks<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; </span></p>
+
<p><span style="font-size: small;">== <span style="font-size: small;"><span style="font-size: small;"> </span>[CLASS] Leading Companies and Leading Products ==</span><br /><span style="font-size: small;">(3 Hour)</span> </span></p>
<p><span style="font-size: small;">== <span style="font-size: small;"><span style="font-size: small;"> </span>[CLASS] Leading Companies and Leading Products ==</span><br /><span style="font-size: small;">(3 Hour)</span> - How-to-use, why-to-use, where-to-apply<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Top 3 Products - in-depth<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; 1: - QQ</span></p>
+
<p><span style="font-size: small;"><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>How-to-use, why-to-use, where-to-apply<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Top 3 Products - in-depth</span></p>
 
<p><span style="font-size: small;"><br /></span></p>
 
<p><span style="font-size: small;"><br /></span></p>
 
<p>== <span style="font-size: small;">[CLASS] Network analysis and deep-dives ==<br /></span></p>
 
<p>== <span style="font-size: small;">[CLASS] Network analysis and deep-dives ==<br /></span></p>
<p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span>Identification:<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Identify Compromised System<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Isolate Zombie<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Stopping malware<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; </span></p>
+
<p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span>Identification:<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Identify Compromised System<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Isolate Zombie<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Stopping malware<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; </span></p>
<p><span style="font-size: small;"><span style="font-size: small;">== [CLASS] Intrusion signatures &amp; footprints ==</span><br /><span style="font-size: small;">(3 Hour) </span>-<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Signature Analysis<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - P32/PDOM screenshots<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - RootKits<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; 1: - QQ</span></p>
+
<p><span style="font-size: small;"><span style="font-size: small;">== [CLASS] Intrusion signatures &amp; footprints ==</span><br /><span style="font-size: small;">(3 Hour) </span>-<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Signature Analysis<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>P32/PDOM screenshots<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>RootKits<br /></span></p>
<p><span style="font-size: small;"><br /></span></p>
+
<p>&nbsp;</p>
 
<p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Prevention - Perimeter Security ==<br /></span></span></p>
 
<p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Prevention - Perimeter Security ==<br /></span></span></p>
<p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - Introduction<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - PKI - Create cert, sign them, install them, trust them and external providers</span></p>
+
<p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span><br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; </span>Introduction<br /><span style="font-size: small;">&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; &gt;&gt; P</span>KI - Create cert, sign them, install them, trust them and external providers</span></p>
<p><span style="font-size: small;"><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />== <span style="font-size: small;">[CLASS] Firewalls &amp; Rulesets ==</span><br /><span style="font-size: small;">(3 Hour) </span><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - ACE, ACL, ACI<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - LDAP and Directory Infrastructure<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; 1: - QQ</span></p>
+
<p><span style="font-size: small;"><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br />== <span style="font-size: small;">[CLASS] Firewalls &amp; Rulesets ==</span><br /><span style="font-size: small;">(3 Hour) </span><br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - ACE, ACL, ACI<br />&nbsp;&nbsp;&nbsp; &nbsp;&nbsp;&nbsp; - LDAP and Directory Infrastructure<br /></span></p>
 
<p><span style="font-size: small;"><br /></span></p>
 
<p><span style="font-size: small;"><br /></span></p>
 
<p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Adaptive Security ==</span> &nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;</span></span></p>
 
<p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Adaptive Security ==</span> &nbsp;&nbsp; &nbsp;&nbsp;&nbsp; <br /><span style="font-size: small;">&nbsp;</span></span></p>

Revision as of 18:08, 5 April 2015

Classroom Training Document and Materials eShare:

Cloud based Secure Online Private Share Folder For Software
Training Material eShare


Total Instruction Hours:
21 hours of Classroom Instructions
30 hours of Hands-on Lab
9 hours of Testing (in 9 separate Tests)

Net total is 60 hours of curriculum


The Course Curriculum for this Advanced Security Training:

 

[CLASS] Introduction to networks security


(3 Hour)
     - Network Concepts
        >> IPV4, Device ID, Network cards - hard/soft
        >> Authentication Factors
        >> Authentication & Authorization
        >> New Authentication Systems

        >> LDAP and Directory Management
            >> Traditional data storage Vs. Tree structure
            >> Caching Vs Searching
            >> Profiling Vs Tabulation
            >> Active Directory and other common LDAP vendors
            >> Virtual and Meta


[CLASS] Infrastructure Security


(3 Hour)
        >> Context Aware Firewalls (ASA)
        >> Policy Management
        >> Object Definition and ACL Management (ASA)
        >> Infrastructure & Security Protocols
        >> Enterprise Security Products (PDF and Notes)
        >> Perimeter Security
        >> In-Network Security
        >> DNS Security is Corporate #1 Priority
        >> Identity Management

  • IAM - Unified identity management - self reg, identity lifecycle, provisioning, sync
  • OAM - centralized access management - Authn and Authz - for Web, service-based, mobile,..
  • OID - Centralized data storage & encryption - encrypt data-in-storage & data-in-transit - DLP
  • Admin - Delegated admin, admin-overview, Rule based admin oversight, Re-Certification
  • Audit - Yearly, Quaterly and monthly compliance checks, internal audit and external audits
  • Compliance - Support for SSAE16, SOC1, SOC2, PCI and SOX

    

[CLASS] Security Management </h2>
(3 Hour)
</span></p> <p>        >> Intrusion Prevention
        >>  VPN
        >> Wireless Security
               
        >> Vulnerability Analysis
        >> Security Policies
            >> Corporate Security Policies
            >> Hackers Hat - breaking corporate security code
            >> Endpoint Assessments
            >> Enabling Intrusion Prevention System (IPS)
           
        >> Best Practices - Cyber-Security
            >> Traditional Hacking Techniques
            >> Monitor telemetry data
            >> Event Coorelation for alarms
            >> Risk Analysis and Mitigation
           
        >> Review malware signatures
            >> Viruses & Worms
            >> Network Trace gathering and analysis
           
        >> Review common hacking techniques and kits
            >> Backdoor
            >> Botnets
            >> DoS and DDoS
            >> Tunnel Attacks
           
</p> <p><h2> [CLASS] Leading Companies and Leading Products </h2>
(3 Hour)
</p> <p>        >> How-to-use, why-to-use, where-to-apply
        >> Top 3 Products - in-depth
</p> <p>
</p> <p><h2> [CLASS] Network analysis and deep-dives </h2>
</p> <p>(3 Hour) Identification:
        >> Identify Compromised System
        >> Isolate Zombie
        >> Stopping malware
       
</p> <p><h2> [CLASS] Intrusion signatures & footprints </h2>
(3 Hour) -
        >> Signature Analysis
        >> P32/PDOM screenshots
        >> RootKits
</p> <p> </p> <p><h2> [LAB] Prevention - Perimeter Security </h2>
</p> <p>(3 Hour)
        >> Introduction
        >> PKI - Create cert, sign them, install them, trust them and external providers
</p> <p>
       
<h2> [CLASS] Firewalls & Rulesets </h2>
(3 Hour)
        - ACE, ACL, ACI
        - LDAP and Directory Infrastructure
</p> <p>
</p> <p><h2> [LAB] Adaptive Security </h2>       
 
</p> <p>(3 Hour)
     >> Introduction to Software based security:
        > Clamscan, Bayes Algo, Other softwares
        > IPtables
        > Software firewal of Linux
        > Hardening Kernel and Linux services
        1: - QQ
       
(3 Hour)  Hardware based security
        > IPS
        > Firewall
        > Shun Hosts
        1: - QQ
         
<h2> [CLASS] Offensive Network Design </h2>
(3 Hour)
    - Review existing network
        >> Interview Customer - questions to ask - checklist
        >> Checklist for Table Of Obervation - recording
        >> Security checklist for implementation
        >> Master Checklist for design analysis
    - Review current architecture
        >> First create your proposed topology and artifacts
        >> Peer review of topo
        >> Oversight review & Risk Assessment
        >> DR and BCP requirements
        >> Customer Approval & Signoff
    1: - QQ
</p> <p>
</p> <p> <h2> [LAB] Appliance Setup </h2>               
 
</p> <p>(9 Hour) 
      1: - Prereq's - Before you begin
      2: - Juniper entry point appliance - SS5
      2: - Cisco entry point appliance - ASA 5505
      2: - Netgear entry point appliance - FVS 318
      2: - IPSec VPN end-to-end setup and configuration
      1: - QQ
     
 <h2> [LAB] Active Monitoing Setup </h2>
</p> <p> (3 Hour)
        - Introduction to Netflow Vs. SNMP
    - Monitoring Web Servers
    - Monitoring DNS Servers
    - Monitoring IMAP Servers (Dovecot)
    - Monitoring Email Gateway (Postfix)
    - Monitoring from external service providers - pingdom
    1: - QQ

<h2> [LAB] Active Response Management </h2>
</p> <p> (4 Hour)
    - Firewall based Block Rules
        > Single IP
        > Entire Subnet
    - Reporting Abusive Originating IPs
    - Blacklist and Backscatterers
    - Load Balancing Services
    - Failover Services
    1: - QQ




</p>