Network Security

R11,999.00

Network security is a board term that covers multiple technologies, devices, and processes. Nowadays, every organization, regardless of size, industry, or infrastructure, requires a network security expert in place to protect it from the ever-growing landscape of cyber threats today. After this course, you will be able to discover security vulnerabilities across the entire network by using network hacking techniques and vulnerability scanning. You will understand the various types of firewalls that are available and master the hardening for both Windows and Linux servers.

Duration: 40 hours

Target Audience
The course targets participants with basic knowledge in IT or networking, who wish to understand corporate cybersecurity and cyber defense on a technical perspective. Primarily:
• IT personnel
• IT/network administrators
• Incident responders
• Security analysts

Pre-requisites
• ThinkCyber Level-1 Courses

Objectives
• Learning the cyber threat landscape that modern organizations face
• Acquiring the necessary knowledge and tools to defend the corporate network from various cyber threats
• Identifying when attacks are happening on the network
• Testing networks and systems for vulnerabilities
• Learning how to analyze network traffic and create a monitoring environment to operate as a semi-Security Operations Center
• Becoming familiar with available tools for performing security-related tasks

Category:

Description

Module 1: Cyber Security in Networks

This module will dive deeper into the world of cybersecurity, the primary goal being to teach participants to embrace the attacker state-of-mind to recognize the necessary defense mechanisms. Participants will deal with several types of malware, spyware, viruses, and vulnerabilities that can put the organization network at risk—also, different social-engineering techniques and Honeypots.

  • Network Security Fundamentals
    o Principles of Network Security
    o Security Terminologies
  • Security Components
  • Security Policies
    o Security Procedures
  • Physical Security
  • Securing Devices
  • Securing Applications
  • OS Updates
  • Advanced TCP/IP
    o Communication Protocols in Depth
    o Network Layers Attacks
    o The Process of DHCP and APIPA

Module 2: Advanced Network Awareness

Large organizations these days suffer greatly from network attacks and malicious intrusions. Those who manage the organization’s network have an immense impact on ensuring its safety. This module will teach the student to embrace the role of the network security administrator. Students will learn to inspect the network and find targets and possible security issues before the attackers can use them.

  • Analyzing The Network
    o Preforming Web-Screenshots using NMAP
    o Detecting Service Changes using Shodan CLI
    o Launching NSE to Detect Possible Vulnerabilities
    o The Methodology of Finding Hosts in the Network
    o Capturing Fake MAC and IP Addresses
    o Spying the Local network using Driftnet and Urlsnarf
    o Hunting for Rootkits with windbg
  • Analysis of Leaked Network Security Information
    o The OSINT Framework
    o Social Engineering
    o Using The-Harvester to Find Exposed Private Emails
    o Private Domain Hunting using Amass
    o The WHO-IS and Dimitry Tools
    o Phishing Attacks
    o DNS Poisoning
  • Network Security Threats (hands-on)
    o Virus
    o Malware
    o Trojans
    o Worm
    o Spyware
    o Payloads
    o Buffer Overflows

Module 3: Hardening the Network

This module will explain a wide verity of IT security concepts and tools. The students will learn the step by step of hardening measures. Explore some security weaknesses of the Linux operating system, and learn to protect against those weaknesses. Learn how to secure the various account types on a Linux system, enforce strong passwords, configure the firewall, and more.

  • Routing and Network Components Hardening
    o Static ARP and DHCP Entry to Prevent Poisoning
    o Firewall Components
  • Iptables vs. UFW
  • Monitoring the FW using Tshark
  • IP Chains Concepts
    o Proxy Server
  • Load-Balancing
  • Mitigating DoS Techniques
  • Counter-measuring attacks
    o Designing and Configuring an IDS
  • IDS vs. IPS
  • Host vs. Network-Based IDS
  • Limitation of IDS
  • Snort as IDS and IPS
  • Installing Snort
  • Setting Rules
  • Identifying NMAP Scans
    o Constructing Honeypots
    o Session Hijacking Counter-Measures
    o Detecting Active Sniffing
    o SMB Hardening against Enumerations
    o Identifying Log Tampering
  • Working with VPNs
    o VPN Fundamentals
    o IP Security Protocols
    o Design and Architecture
    o VPN Security
    o Configure your VPN

Module 4: Linux and Windows Hardening

This module will cover foundational security concepts and guidelines that can help Linux and Windows systems administrators keep their servers safe. The training includes in-depth walkthrough hardening measures, and step-by-step creating your security environment.

  • Securing Linux
    o Key Concepts Linux
    o Administration and Security
    o Linux Network Files
    o Linux Network Process
    o Key Linux Network Commands
    o Hardening Linux
    o Network File System and Linux
    o Network Information Service and Linux
  • Securing Windows
    o Windows Fundamental Security
    o Windows Infrastructure
    o Windows Authentication
    o Windows User and Group Security