Cyber security for engineers

Download as pdf or txt
Download as pdf or txt
You are on page 1of 2

TCP/IP foundation for engineers

Cyber security for engineers


A 5 day Hands on training course

Description Key outcomes

This cyber security course focuses on the network side By the end of the course delegates will be able to:
of security. Technologies rather than specific products
 Describe:
are studied focusing around the protection of networks
Basic security attacks, RADIUS, SSL, VPNs
using firewalls and VPNs.
 Deploy firewalls and secure networks.

 Explain how the various technologies involved in an


IP VPN work.

 Describe and implement:


L2TP, IPsec, SSL, MPLS L3 VPNs.

Training Approach Details

This structured course uses Instructor Led Training to Who will benefit?
provide the best possible learning experience. Small Anyone working in the security field.
class sizes ensure students benefit from our engaging
Prerequisites
and interactive style of teaching with delegates
TCP/IP foundation for engineers.
encouraged to ask questions throughout the course.
Quizzes follow each major section allowing checking of Duration: 5 days
learning. Hands on sessions are used throughout to
allow delegates to consolidate their new skills.
Overall rating:

Generic Training Small Class Sizes Hands On Training Our Courseware Customise Your Course

Generic training We limit our maximum The majority of our We write our own Please contact us if you
compliments product class size to 8 delegates; courses use hands on courses; courseware would like a course to be
specific courses covering often we have less than sessions to reinforce does not just consist of customised to meet your
the complete picture of this. This ensures optimal the theory. slides and our slides are specific requirements.
all relevant devices interactivity between diagrams not bullet point Have the course your
including the protocols delegates and instructor. text. way.
“on the wire”.
“Friendly environment “Excellent course. The “Not many courses “Comprehensive “I was very impressed by
with expert teaching that small class size was a have practice added to materials that made the the combination of
teaches the why before great benefit...” it. Normally just the course easy to follow practical and theory.
the how.” M.B. IBM theoretical stuff is and will be used as a Very informative.
G.C. Fasthosts covered.” reference point.” Friendly approachable
J.W. Vodafone V.B. Rockwell Collins environment, lots of
hands on.”
S.R. Qinetiq

www.snt.co.uk Page 1/2 Speak with our team now +44 (0)1737 821590
Cyber security for engineers

Course Content

Security review Authentication


Denial of service, DDOS, data manipulation, data theft, Types of authentication, Securid, Biometrics, PGP,
data destruction, security checklists, incident response. Digital certificates, X.509 v3, Certificate authorities,
Security exploits CRLs, RADIUS. Exercise: Using certificates.
IP spoofing, SYN attacks, hijacking, reflectors and VPN overview
amplification, keeping up to date with new threats. Hands What is a VPN? What is an IP VPN? VPNs vs. Private
on: port scanning, use a “hacking” tool. Data Networks, Internet VPNs, Intranet VPNs, Remote
Client and Server security access VPNs, Site to site VPNs, VPN benefits and
Windows, Linux, Log files, syslogd, accounts, data disadvantages.
security. Hands on: Server hardening. VPN Tunnelling
Firewall introduction VPN components, VPN tunnels, tunnel sources, tunnel
What is a firewall? Firewall benefits, concepts. Hands on: end points, tunnelling topologies, tunnelling protocols,
launching various attacks on a target. which tunnelling protocol? Requirements of tunnels.
Firewall types L2TP
Packet filtering, SPI, Proxy, Personal. Software firewalls, Overview, components, how it works, security, packet
hardware firewalls. Firewall products. Hands on: Simple authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3
personal firewall configuration. tunnelling. Hands on: Implementing a L2TP tunnel.
Packet filtering firewalls IPsec
Things to filter in the IP header, stateless vs. stateful AH, HMAC, ESP, transport and tunnel modes, Security
filtering. ACLs. Advantages of packet filtering. Hands on: Association, encryption and authentication algorithms,
Configuring packet filtering firewalls. manual vs automated key exchange, NAT and other
Stateful packet filtering issues. Hands on: Implementing an IPsec VPN.
Stateful algorithms, packet-by-packet inspection, SSL VPNs
application content filtering, tracks, special handling Layer 4 VPNs, advantages, disadvantages. SSL. TLS.
(fragments, IP options), sessions with TCP and UDP. TLS negotiation, TLS authentication. TLS and
Firewall hacking detection: SYN attacks, SSL, SSH certificates. Hands on: Implementing a SSL VPN.
interception. Hands on: SPI firewalls. MPLS VPNs
Proxy firewalls Introduction to MPLS, why use MPLS, Headers,
Circuit level, application level, SOCKS. Proxy firewall architecture, label switching, LDP, MPLS VPNs, L2
plusses and minuses. Hands on: Proxy firewalls. versus L3 VPNs. Point to point versus multipoint MPLS
Firewall architectures VPNs. MBGP and VRFs and their use in MPLS VPNs.
Small office, enterprise, service provider, what is a DMZ? Hands on: Implementing a MPLS L3 VPN.
DMZ architectures, bastion hosts, multi DMZ. Virtual Penetration testing
firewalls, transparent firewalls. Dual firewall design, high Hacking webservers, web applications, Wireless
availability, load balancing, VRRP. Hands on: Resilient networks and mobile platforms. Concepts, threats,
firewall architecture. methodology. Hands on: Hacking tools and
Testing firewalls countermeasures.
Configuration checklist, testing procedure, monitoring
firewalls, logging, syslog. Hands on: Testing firewalls.
Encryption
Encryption keys, Encryption strengths, Secret key vs
Public key, algorithms, systems, SSL, SSH, Public Key
Infrastructures. Exercise: Password cracking.

Step back Step forward

Linux security
TCP/IP foundation for
Cyber security for
engineers
engineers
Penetration testing and
ethical hacking

www.snt.co.uk Page 2/2 Speak with our team now +44 (0)1737 821590

You might also like