Length: 2 Days
Network Security Training
Network security is any system, device, or action designed to protect the safety and reliability of a network and its data.
Organizations invest in network security to protect their internet-connected systems and networks from cyber criminals or a network virus.
The focus of network security is generally targeted at protecting files, documents, and information from those types of attacks. This is commonly done through authentication in the form of a username and password, but it can also employ other tools like firewalls, antivirus programs, and virtual private networks (VPNs) to protect the network’s information.
The benefits of network security are substantial such as enhancing client and consumer confidence, and it protects your business from the reputational and legal fallout of a security breach.
There’s also the compliance issue. These days, network security isn’t necessarily “just an option” for organizations. Effective network security helps a business stay compliant with governmental and business regulations, thus avoiding potentially stiff fines in the event of a data breach.
There’s also the “big picture” benefit of network security that’s often overlooked by organizations. In reality, effective network security allows for a more modern workplace by allowing employees to work securely from any location using VPN.
Network security typically consists of three different controls: physical, technical and administrative.
Physical security controls are designed to prevent unauthorized personnel from gaining physical access to network components such as routers, cabling cupboards and so on. Controlled access, such as locks, biometric authentication and other devices, is essential in any organization.
Technical security controls protect data that is stored on the network or which is in transit across, into or out of the network.
Administrative security controls, on the other hand, consist of security policies and processes that control user behavior, including how users are authenticated, their level of access and also how IT staff members implement changes to the infrastructure.
Analysts often point out that there are many layers to consider when addressing network security across an organization. Attacks can happen at any layer in the network security layers model, so your network security hardware, software and policies must be designed to address each area.
Network Security Training Course by Tonex
Network security training by Tonex introduces the importance of security in networks and helps you to understand the main components of a secured network. Network security training helps you examine the security related issues in networks and provides you with necessary preparation to secure the networks from attacks and exploits.
Added Value of Network Security Training
- Public key infrastructure
- Wireless local area network
- WLAN security concepts
- IPsec
- Internet key exchange version 2 (IKEv2)
- Security issues related to IPv4 or IPv6
- Multi-protocol label switching security and network endpoint assessment control
Learn About
- The main types of network attacks and security issues related to different networks
- The IEEE standards for network security, main parts of networks and their security issues, and WLAN architecture
- Wired equivalent privacy (WEP), virtual private network (VPN), static IPs, and access point replacement in network security training
- The concept of TCP/IP, security issues related to internet protocol, standards for IP security, Authentication header protocol (AH), and internet key exchange
- The difference between IPv4 and IPv6, different security issues related to IPv4, transitions for IPv6, and dual stack approach
- The multi-protocol label switching (MPLS), MPLS security, label switching routers, MPLS quality of service and MPLS security tools
- The endpoint assessment in networks, network access control agent/device/server, wireless infrastructure security, identity management and prepare yourself for next generation network architecture by learning the main drivers in next generation networks
Who Could Benefit from Network Security Training?
If you are an IT professional who specialize in network security, you will benefit the presentations, examples, case studies, discussions, and individual activities upon the completion of the introduction to secure software engineering training and will prepare yourself for your career.
TONEX Network Security Training Methodology
Network security training will introduce a set of labs, workshops and group activities of real world case studies in order to prepare you for the real-world problems and to be able to tackle all the related network security challenges.
Audience
Network security training is a 2-day course designed for:
- IT professionals in the area of information security and network security
- Executives and managers of network security and system engineering areas
- Information technology professionals, network engineers, security analysts, policy analysts
- Security operation personnel, network administrators, system integrators and security consultants
- Security traders to understand the network security, or web security.
- Investors and contractors who plan to make investments in system engineering industry.
- Technicians, operators, and maintenance personnel who are or will be working on network security projects
- Managers, accountants, and executives of cyber security industry.
Training Objectives
Upon completion of the network security training course, the attendees are able to:
- Improve your understanding of network security
- Apply the knowledge of network security in design, develop or integrate the secure networks
- Apply logic, mathematics and science in engineering concept for a network system
- Learn principles of network system design and implementation
- Understand the different types of attacks in networks
- Explain the concept of wireless local area network (WLAN)
- Tackle the security issues in WLAN
- Learn the IP security and internet key exchange concepts
- Understand the multi-protocol label switching security issues in networks
- Design and test the networks for secure applications with identifying attacks
Training Outline
The network security training course consists of the following lessons, which can be revised and tailored to the client’s need:
Network Security Basics
- Introduction to Network Security
- Data Security and Network Security
- History of Network Security
- Network Security Timeline
- Internet Architecture and Vulnerable Security Aspect
- IPv4 and IPv6 Architectures
- Attacks through the IPv4
- Common Internet Attack Methods
- Eavesdropping
- Viruses
- Worms and Trojans
- IP Spoofing Attacks
- Denial of Service (Dos)
- Phishing
- Cryptographic Systems
- Firewall
- Secure Socket Layer (Ssl)
- Security Issues of IPv6
- Security in Different Networks
- Current Developments in Network Security
- Hardware/Software Development for Network Security
Brief Overview of Public Key Infrastructure (PKI)
- Definition of PKI
- PKI Components
- Applications and PKI Function
- PKI Architectures
- PKI Data Structures
- PKI Services
- PKI Related Standards
Wireless Local Area Network (WLAN)
- Introduction to WLAN
- IEEE Wireless Network Specifications
- IEEE 802.11
- Different WLAN Technologies
- Narrowband
- Spread Spectrum
- Frequency Hopping Spread Spectrum (FHSS)
- Direct Sequence Spread Spectrum (DSSS)
- WLAN Frequency Usage
- Peer to Peer Mode Versus Infrastructure Mode
- Wireless Network Components
- Access Point
- PC Card
- Router
- PCI Adapter
- WLAN Performance
- Access Points and NICS
- Radio Frequency Interference
- Power Consumption Levels
- Antenna Types
- Aggregating Bandwidth
- Wireless Security
- Bluetooth Versus IEEE 802.11
- Recent WLAN Solutions
WLAN Security
- WLAN Architecture
- Independent WLAN
- Infrastructure WLAN
- Microcells and Roaming
- Security Threats of WLAN
- Denial of Service
- Spoofing and Session Hijacking
- Eavesdropping
- Wired Equivalent Privacy (WEP)
- Weaknesses of WEP
- Practical Solutions for WLAN Security
- Changing Default SSID
- Utilizing a VPN
- Utilizing the Static IPs
- Access Point Replacement
- Minimizing the Radio Wave Propagation
- New Standards for WLAN Security
- PPP, EAP, TKIP, CCMP
- Air-Defense
- ISOMAIR Wireless Security
- Wireless Security Auditor (WSA)
Internet Protocol Security (IPsec) and Internet Key Exchange Version 2 (IKEv2)
- TCP/IP Protocol
- The IP Packet Format
- Security Issues Related to Internet Protocol
- Security Objectives of IPsec
- IPsec Standardization
- Overview of IPsec Architecture
- IPsec Protocol Modes
- Authentication Header (AH) Protocol
- Encapsulating Security Payload (ESP) Protocol
- IPsec Replay Protection
- Security Association
- Nesting Security Association
- IPsec Security Policy
- ISAKMP
- Introduction to IKE
- Computation of IKE Session Keys
- IKE Authentication Methods
- Main Mode Exchange
- IPsec Processing
Transition Security Issues of IPv4 to IPv6
- IPv4 Versus IPv6
- IPv4 Security Issues
- IPv6; Features
- IPsec
- Comparison Between IPv4 and IPv6
- Transition Consideration in IPv6
- IPv6to4 (Tunneling)
- TRT (Translation)
- Dual Stack Approach
Multi-Protocol Label Switching (MPLS) Security
- Evolutions To MPLS
- The MPLS Architecture
- Label Switching Routers
- MPLS Labels
- Network Resilience
- Virtual Private Networks
- MPLS Traffic Engineering
- MPLS Quality of Service
- Security Issues in MPLS
- Sample Tools iIn MPLS Security
Network Endpoint Assessment (Network Access Control)
- Ensuring Integrity with Network Access Control
- Network Access Control Device
- Network Access Control Agent
- Network Access Control Server
- Secure Wireless Infrastructure
- Endpoint Compliance System
- Identity Management
- Authentication
- Exploitation in Network Access Control
- Risks of Network Access Control
Next Generation Networks
- Main Drivers to Next Generation Networks
- Network Convergence
- Heterogeneity of The Telecommunication Infrastructure
- Applications of Next Generation Networks
- Realization Example of Next Generation Networks
- Growing Competition from other Sectors
- GBE
- Wireless in Next Generation Networks
- Switches in Next Generation Networks
- Servers in Next Generation Networks
- Security Issues in Next Generation Networks
- ITU-T Standard Model
Hands-On, Workshops and Group Activities
- Labs
- Workshops
- Group Activities
Sample Workshops and Labs for Network Security Training
- Eavesdropping Attacks and Prevention against Them
- Isolating WLAN Traffic using Separate Firewall
- Virtual Private Network over WAN
- Security Management in Small Business Network
- ICMP Ping ; Ping Traces and Link Failures
- Firewall; Denying Multimedia Traffic with Proxy
- VPN; Securing Non-Local Connections using Virtual Private Networks
- VLAN; Generating User Logical Groups with Virtual LANs
Network Security Training