Course : Network/Internet Security - Overview

Network/Internet Security - Overview

Download in PDF format Share this course by email 2


This seminar will show you how to meet the security requirements of companies and incorporate security into the architecture of an Information System. It includes a detailed analysis of threats and intrusion methods as well as an overview of the most common security measures available on the market. You'll have the technical and legal information to ensure and supervise the security of your IS.


Inter
In-house
Custom

Seminar in person or remote class

Ref. SRI
Price : 2890 € E.T.
  3d - 21h00




This seminar will show you how to meet the security requirements of companies and incorporate security into the architecture of an Information System. It includes a detailed analysis of threats and intrusion methods as well as an overview of the most common security measures available on the market. You'll have the technical and legal information to ensure and supervise the security of your IS.

Teaching objectives
At the end of the training, the participant will be able to:
  • Be aware of developments in cybercrime and the challenges it poses
  • Gain proficiency in the security of the cloud, applications, and client workstations
  • Understand cryptography concepts
  • Manage IS security monitoring processes

Intended audience
CISOs, DSI, architects, developers, project managers, sales representatives, system & network admins.

Prerequisites
General knowledge of computing and the Internet are necessary.

Course schedule

Information security and cybercrime

  • Security principles: Defense in depth, cyber risk modeling.
  • Risk management methods (ISO 27005, EBIOS RM).
  • Overview of ISO 2700x standards.
  • Evolution of cybercrime.
  • New threats (APT, spear phishing, watering hole, crypto-jacking, etc.).
  • Security flaws in software.
  • Anatomy of a cyberattack (Kill Chain).
  • The 0day, 0day Exploit, and exploit kit vulnerabilities.

Firewall, virtualization and cloud computing

  • Perimeter protection based on firewalls and DMZs.
  • Differences between UTM, enterprise, NG and NG-v2 firewalls.
  • IPS (Intrusion Prevention System) and IPS NG products.
  • Vulnerabilities in virtualization.
  • Risks associated with Cloud Computing according to CESIN, ENISA, and the CSA.
  • CASB solutions to secure data and applications in the cloud.
  • The Cloud Controls Matrix and how to use it to evaluate Cloud providers.

Client workstation security

  • Understanding client workstation oriented threats.
  • Anti-virus/anti-spyware software.
  • How to manage security patches on client workstations.
  • Ransomware: preventive and corrective measures.
  • How to make removable devices secure.
  • Vulnerability of browsers and plug-ins.
  • Drive-by download attack.
  • Threats via USB keys (BadUSB, rubber ducky, etc.).

Fundamentals of cryptography

  • Cryptographic techniques.
  • Public key and symmetric key algorithms.
  • Simple, salted and keyed (HMAC) hash functions.
  • Public-key infrastructure (PKI).
  • CC certification and ANSSI qualification of cryptographic products.

Authentication and qualification of users

  • Biometric authentication and legal aspects.
  • Challenge/response authentication.
  • The different attack techniques (brute force, keylogger, credential stuffing, etc.).
  • Strong multi-factor authentication (MFA).
  • Chip card authentication and X509 client certificate.
  • The HOTP and TOTP standards of OATH.
  • The UAF and U2F standards of the FIDO (Fast ID Online) alliance.

Network flow security

  • The SSL crypto API and its upgrades from SSL v2 to TLS v1.3.
  • Attacks on SSL/TLS protocols.
  • Attacks on HTTPS flows.
  • Hardware key confinement, FIPS-140-2 certifications.
  • The IPsec standard, AH and ESP modes, IKE and key management.
  • Overcoming problems between IPSec and NAT.
  • The SSL VPNs. What are the benefits compared to IPSec?
  • Using SSH and OpenSSH for secure remote administration.
  • On-the-fly decryption of flows: Legal aspects.
  • Easily evaluating the security of an HTTPS server.

Wi-Fi security

  • Specific Wi-Fi attacks.
  • How to detect Rogue APs.
  • Terminal security mechanisms.
  • KRACK attack on WPA and WPA2.
  • Description of the risks.
  • The IEEE 802.11i security standard.
  • What WPA3 adds and the DragonBlood vulnerabilities.
  • User and terminal authentication.
  • WiFi authentication within the company.
  • Auditing tools, free software, aircrack-ng, Netstumbler, WiFiScanner, etc.

Smartphone security

  • Threats and attacks on mobile devices.
  • iOS and Android: strengths and weaknesses.
  • Viruses and malicious code on mobile phones.
  • MDM and EMM solutions for fleet management.

Application security

  • Applying the principle of defense in depth.
  • Web and mobile apps: What security differences are there?
  • Main risks according to OWASP.
  • Focus on XSS, CSRF, SQL injection, and session hijacking attacks.
  • Main methods of secure development.
  • What security clauses are there in development contracts?
  • The application firewall or WAF.
  • How to assess an application's level of security.

Management and active supervision of security

  • Safety audits (scope and frameworks: ISO 27001, GDPR, etc.).
  • Intrusion tests (black box, gray box and white box).
  • How to effectively respond to attacks.
  • Setting up an SIEM solution.
  • Should you implement or outsource your Security Operation Center (SOC)?
  • SOC 2.0 technologies (CASB, UEBA, Deceptive Security, EDR, SOAR, machine learning, etc.).
  • ANSSI labels (PASSI, PDIS & PRIS) for outsourcing.
  • Incident response procedures (ISO 27035 and NIST SP 800-61 R2).
  • Bug Bounty platforms.


Customer reviews
4,5 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class