Overview

Organisations must consider securing their systems and platforms that are linked across enterprise-wide and virtual private networks, notwithstanding connect mobile users. In this course, delegates will learn about the fundamental security concepts, security policy management and end-to-end network security. This course helps delegates to analyse the risks to networks and the appropriate countermeasures (firewalls and intrusion detection) to reduce exposure to network attacks and malicious software.

This course provides the essential network security foundation training needed to address the cyber threat lifecycle, utilising Windows 10 & Server 2016 with offensive & defensive security labs.

Prerequisites

There are no specific prerequisites for this course, however, participants are expected to have a general understanding of cyber threats and risk management. This course does not teach TCP/IP or OSI model topics in depth.

Learning Outcomes

  • Networking Basics
  • Fundamental Security Concepts
  • Security Policy Management
  • AD Group Policy
  • Tunnelling & End to End Security
  • Firewalls and Intrusion Detection
  • Attacks and Malicious Software

Course Outline

Module 1 - Recap Networking Basics

  • OSI Model
  • TCP/IP

Module 2 - Fundamental Security Concepts

  • Encryption
  • Hashing
  • Access Control
  • Digital Signature
  • Authentication, Authorization and Accounting
  • Secure planning
  • Policies and mechanisms

Lab 1: Cryptanalysis of Substitution Ciphers

  • Exercise 1: Frequency Analysis of a Caesar Cipher
  • Exercise 2: Kasiski Analysis of a Vigenere Ciphertext

Lab 2: Asymmetric Encryption RSA Demonstration

Lab 3: Dictionary Attacking the DVWA with Hydra and Burp Suite

Lab 4: Cracking Hashes with John the Ripper

Module 3 - Security Policy Management- Active Directory Group Policy (GPOs)

  • Introducing Group Policy
  • Containers
  • Templates
  • GPO
  • Group Policy Management Console (GPMC)
  • Group Policy Implementation

Lab 5: Configuring Active Directory Group Policies

  • Exercise 1: Create a New User in Active Directory
  • Exercise 2: Create a New GPO

Module 4 - Tunnelling and End-to-End Security

  • Security and network layers
  • IPSEC
  • SSL / TLS
  • Flaws and comparisons
  • SSH

Lab 6: Configuring IPsec on a Windows 2016 Server

Lab 7: SSL Handshake Analysis using Wireshark

Lab 8: Exploiting the Heartbleed Bug using Metasploit

Module 5 - Firewalls and Intrusion Detection

  • Firewalls
  • Packet filtering,
  • State full inspection
  • Application gateways
  • ACL's.

Lab 9: Configuring Access Control Lists

Lab 10: Using Snort to Detect a Brute Force Hydra Attack

Module 6 - Attacks and Malicious Software

  • Malware
  • DDOS
  • SQL Injection
  • Cross Site Scripting

Lab 11: Using the MITMf to Bypass HSTS

Lab 12: Performing FilePwn Using the MITMf

Lab 13: Using the LOIC to Perform DoS Attacks