Network Security Technical Duration: 2 days

Network Security Technical
CONTENT
This course will describe the fundamentals of IP networking security. Protection mechanisms such as firewalls, VPN and user authentication will be covered in technical details.

TARGET AUDIENCE
The target audience for this product is technical personnel or others who need technical knowledge in the area.

PREREQUISITES
The students are supposed to have a basic network understanding equivalent to the course Datacom and telecom convergence, as well as a basic knowledge in TCP/IP.

EXCERCISES
This is a theoretical training with practical exercises.

NOTE: This course is not delivered with the FoldOut methodology.

Introduction
•        What is security?
•        Terminology
•        Risks
•        Different security levels
•        Security vs user friendly

Threats and risks
•        Denial of Service (DoS)
•        Unauthorized access
•        Traffic monitoring
•        Traffic monitoring
•        Data manipulation
•        Reply
•        Traffic analysis
•        Social engineering

Evil code
•        Virus
•        Logical bombs
•        Trojans
•        Worms
•        Hoaxes

Threats when surfing
•        Cookies
•        Spyware
•        Trojans
•        Web highjacking

Threats when using e-mail
•        Webmail
•        Attachments
•        Linked images
•        Phising
•        Spam

IDS and IPS
•        Why it is hard to detect intrusion
•        How to detect intrusion
•        Intrusion Detection System
•        Intrusion Protection System

Encryption
•        Strong and weak encryption
•        Symmetric encryption
•        Asymmetric encryption
•        Certificate
•        Hash mechanisms

Virtual Private Networks
•        IPsec introduction
•        Authentication Header (AH)
•        Encapsulating Security Payload (ESP)
•        Tunnel mode/Transport mode
•        IKE

WLAN Security
•        WEP
•        WPA/TKIP
•        802.1x/EAP

User Authentication
•        PPP/CHAP
•        RADIUS
•        Tokens
•        Biometric authentication

Summary

SHARE THIS: