Security for IT Practitioners

5 Day Course
Hands On
Code SFITP

This course has been retired. Please view currently available Information Security Training Courses.

Modules

Hide all

Introduction to security (10 topics)

  • What is security
  • White hats v black hats
  • Threats to resources
  • A simple security model
  • Industry security standards
  • Security policies
  • Authentication
  • Encryption
  • Access control
  • Audit and administer

TCP/IP for Security (5 topics)

  • TCP/IP Architecture
  • LANs and WANs
  • IP and ICMP services
  • ARP and routing
  • Transport services

Applied Cryptography (7 topics)

  • Encryption and trust relationships
  • Symmetric encryption
  • Asymmetric encryption
  • Message digests
  • Digital certificates
  • Certificate authorities
  • IPSec and VPNs

Virtual Private Networks (6 topics)

  • VPN Benefits
  • PPP with PAP and CHAP
  • Tunnelling Protocols
  • Virtual Private Dial-up Networks
  • IPSec
  • Internet Key Exchange (IKE)

Types of Attack (9 topics)

  • Spoofing
  • Man-in-the-middle
  • Denial of service
  • Insider attacks
  • Bug-based attacks
  • Key logging
  • Brute force attacks
  • Trojans, viruses and worms
  • Root kits

Firewall Roles and Types (6 topics)

  • Packet filters
  • Stateful inspection
  • Circuit level gateways
  • Application proxies
  • Demilitarised zones
  • Network address translation

Firewall Design Topology and Management (4 topics)

  • Design principles
  • Common topologies
  • ICMP and firewalls
  • Firewall management

World Wide Web Security (6 topics)

  • Web technologies
  • Browser privacy
  • Cookies
  • Mobile code threats
  • Web server security
  • Web traffic security

Intrusion Detection Systems (2 topics)

  • IDS methodologies
  • IDS concerns

Operating System Security (3 topics)

  • Key OS vulnerabilities
  • Windows security components
  • Linux security components

The Auditing Process (6 topics)

  • Introduction
  • Risk analysis
  • Ethical hacking
  • Auditing and log analysis
  • Windows & Linux logging
  • Making recommendations and producing reports

Prerequisites

Delegates should have an awareness of the concepts of Internet security and some hands-on experience with computers and networks.

Sections