Overview
Organisations must consider securing their systems and platforms that are linked across enterprise-wide and virtual private networks, notwithstanding connect mobile users. In this course, delegates will learn about the fundamental security concepts, security policy management and end-to-end network security. This course helps delegates to analyse the risks to networks and the appropriate countermeasures (firewalls and intrusion detection) to reduce exposure to network attacks and malicious software.
This course provides the essential network security foundation training needed to address the cyber threat lifecycle, utilising Windows 10 & Server 2016 with offensive & defensive security labs.
Prerequisites
There are no specific prerequisites for this course, however, participants are expected to have a general understanding of cyber threats and risk management. This course does not teach TCP/IP or OSI model topics in depth.
Learning Outcomes
- Networking Basics
- Fundamental Security Concepts
- Security Policy Management
- AD Group Policy
- Tunnelling & End to End Security
- Firewalls and Intrusion Detection
- Attacks and Malicious Software
Course Outline
Module 1 - Recap Networking Basics
- OSI Model
- TCP/IP
Module 2 - Fundamental Security Concepts
- Encryption
- Hashing
- Access Control
- Digital Signature
- Authentication, Authorization and Accounting
- Secure planning
- Policies and mechanisms
Lab 1: Cryptanalysis of Substitution Ciphers
- Exercise 1: Frequency Analysis of a Caesar Cipher
- Exercise 2: Kasiski Analysis of a Vigenere Ciphertext
Lab 2: Asymmetric Encryption RSA Demonstration
Lab 3: Dictionary Attacking the DVWA with Hydra and Burp Suite
Lab 4: Cracking Hashes with John the Ripper
Module 3 - Security Policy Management- Active Directory Group Policy (GPOs)
- Introducing Group Policy
- Containers
- Templates
- GPO
- Group Policy Management Console (GPMC)
- Group Policy Implementation
Lab 5: Configuring Active Directory Group Policies
- Exercise 1: Create a New User in Active Directory
- Exercise 2: Create a New GPO
Module 4 - Tunnelling and End-to-End Security
- Security and network layers
- IPSEC
- SSL / TLS
- Flaws and comparisons
- SSH
Lab 6: Configuring IPsec on a Windows 2016 Server
Lab 7: SSL Handshake Analysis using Wireshark
Lab 8: Exploiting the Heartbleed Bug using Metasploit
Module 5 - Firewalls and Intrusion Detection
- Firewalls
- Packet filtering,
- State full inspection
- Application gateways
- ACL's.
Lab 9: Configuring Access Control Lists
Lab 10: Using Snort to Detect a Brute Force Hydra Attack
Module 6 - Attacks and Malicious Software
- Malware
- DDOS
- SQL Injection
- Cross Site Scripting
Lab 11: Using the MITMf to Bypass HSTS
Lab 12: Performing FilePwn Using the MITMf
Lab 13: Using the LOIC to Perform DoS Attacks