Course : System and Network Security, Level 2

System and Network Security, Level 2

Download in PDF format Share this course by email 2


This next-level course will allow you to measure the security of your Information System using intrusion detection, vulnerability detection, and auditing tools, among others. It will provide you with knowledge of advanced solutions for maintaining and upgrading the desired level of security to meet your needs over time.


Inter
In-house
Custom

Practical course in person or remote class

Ref. SEA
Price : 2860 € E.T.
  4d - 28h00




This next-level course will allow you to measure the security of your Information System using intrusion detection, vulnerability detection, and auditing tools, among others. It will provide you with knowledge of advanced solutions for maintaining and upgrading the desired level of security to meet your needs over time.

Teaching objectives
At the end of the training, the participant will be able to:
  • Measuring the information system's security level
  • Using intrusion detection, vulnerability detection, and auditing tools
  • Strengthening information system security.
  • How an AAA (Authentication, Authorization, Accounting) architecture works.
  • Implementing SSL/TLS.

Intended audience
Department heads, security architects. System and network technicians and administrators.

Prerequisites
Good knowledge of TCP/IP and enterprise network security. Or knowledge equivalent to that provided by the course "System and Network Security, Level 1" (code FRW).

Course schedule

Refreshers.

  • The TCP/IP protocol.
  • Address translation.
  • Network architecture.
  • Firewall: Benefits and limits.
  • Proxys, reverse-proxy: Application protection.
  • Demilitarized zones (DMZ).

Attack tools

  • Attack classification and security paradigms.
  • Principles of attacks: Spoofing, flooding, injection, capture, etc.
  • Libraries: Libnet, Libpcap, Winpcap, Libbpf, Nasl, lua.
  • Tools: Scapy, Hping, Ettercap, Metasploit, Dsnif, Arpspoof, Smurf.
Hands-on work
Analyzing protocols with Wireshark. Using Scapy and Arpspoof.

Cryptography, application

  • Security services.
  • Cryptographic algorithms and principles (DES, 3DES, AES, RC4, RSA, DSA, ECC).
  • Specific certificates and profiles for various servers and clients (X509).
  • IPSEC protocol and virtual private networks (VPN).
  • SSL/TLS and VPN-SSL protocols. Data compression issues.
Hands-on work
Getting started with openssl and implementing OpenPGP. Generating X509 v3 certificates.

AAA architecture (Authentication, Authorization, Accounting).

  • The AAA network: Authentication, authorization, and accounting.
  • One Time Password: OTP, HOTP, Google Authenticator, SSO (Kerberos protocol).
  • The role of the LDAP directory in authentication solutions.
  • The modules PAM and SASL.
  • Radius architecture and protocol (Authentication, Authorization, Accounting).
  • Possible attacks.
  • How to protect yourself.
Hands-on work
Attacking an AAA server.

Detecting intrusions

  • Operating principles and detection methods.
  • Market players, overview of systems and applications involved.
  • Network scanners (Nmap) and application scanners (Web applications).
  • IDSs (Intrusion Detection Systems).
  • The benefits of these technologies and their limits.
  • How to place them in the enterprise architecture.
  • Overview of the market, detailed study of SNORT.
Hands-on work
Installation, configuration, and implementation of SNORT, writing attack signatures.

Verifying a system's integrity

  • Operating principles.
  • What are the products available?
  • Overview of Tripwire or AIDE (Advanced Intrusion Detection Environment).
  • Vulnerability auditing.
  • Principles and methods and organizations for managing vulnerabilities.
  • Reference site and overview of auditing tools.
  • Defining a security policy.
  • Study and implementation of Nessus (status, operation, evolution).
Hands-on work
Vulnerability auditing of the network and servers using Nessus and Nmap. Website vulnerability auditing.

Managing security events

  • Handling information reported by various security equipment.
  • Consolidation and correlation.
  • Overview of SIM (Security Information Management).
  • SNMP management and protocol: Security strengths and weaknesses.
  • SNMP security solution.
Hands-on work
Setting up a SNMP attack.

Wi-Fi network security

  • How do you make a WiFi network secure?
  • Intrinsic weaknesses of WiFi networks.
  • SSID Broadcasting, MAC Filtering: What do they add?
  • Is WEP still useful?
  • The WPA protocol, the first acceptable solution.
  • WPA implementation in shared key mode, is it enough?
  • WPA, Radius and AAA server, enterprise implementation.
  • The 802.11i and WPA2 standards: Which solution is the most advanced today?
  • Injecting traffic, cracking WiFi keys.
Hands-on work
Configuring tools for traffic capture, scanning networks and analyzing Wi-Fi traffic. Configuring an AP (access point) and implementing security solutions.

Telephony-over-IP security

  • Voice-over-IP concepts. Overview of applications.
  • Architecture of a VoIP system.
  • The SIP protocol, an open voice-over-IP standard.
  • Weaknesses of the SIP protocol.
  • Problems with NAT.
  • Attacks on telephony-over-IP.
  • What are the security solutions?

Email security

  • Architecture and operation of email.
  • Protocols and access to emails (POP, IMAP, Webmail, SMTP, etc.).
  • Problems and classifications of email attacks (spam, phishing, identity theft, etc.).
  • Spam fighters.
  • Methods, architectures, and tools for fighting spam.
  • Email address collection tools.
  • Solutions implemented against spam.


Practical details
Hands-on work
Many tools will be deployed by the participants. IDS SNORT detector, vulnerability scan with NESSUS, network analysis and scan with ETHEREAL and NMAP. Making a Wi-Fi network secure.

Customer reviews
4,3 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class