Computer Network Security: Technologies and Tools for Network Admins and Security Officers. This course will explore network security more in-depth, covering critical tools and technologies cyber security professionals in the field need to know in order to keep networks secure.
Advanced Network security consists of the provisions and policies adopted by a network administrator to prevent and monitor unauthorized access, misuse, modification, or denial of a computer network and network-accessible resources. Network security involves the authorization of access to data in a network, which is controlled by the network administrator. Users choose or are assigned an ID and password or other authenticating information that allows them access to information and programs within their authority. Network security covers a variety of computer networks, both public and private, that are used in everyday jobs conducting transactions and communications among businesses, government agencies and individuals.
Detailed Syllabus of Advanced Network Security Course:
Network Security Highlights
Network Security
Compliance and Operational Security
Threats and Vulnerabilities
Application, Data and Host Security
Access Control and Identity Management
Cryptography
Network Security (In Detail)
Security configuration for Network devices
Firewalls
Routers
Switches
Load Balancers
Proxies
Web security gateways
VPN concentrators
Protocol analyzers
Spam filter
UTM security appliances
URL filter
Content inspection
Malware inspection
Web application firewall vs. network firewall
Application aware devices
Firewalls
IPS
IDS
Proxies
Rule-based management
Firewall Rules
VLAN management
Secure router configuration
Access control lists
Port Security
802.1x
Flood guards
Loop protection
Implicit deny
Explain network design elements and components
DMZ
Subnetting
VLAN
NAT
Remote Access
Telephony
Virtualization
Implement common protocols and services.
Transport Protocols: TCP/UDP
Security Protocols: IPSec, SNMP, SSH, DNS, TLS, SSL
Troubleshoot security issues related to wireless networking
WPA
WPA2
WEP
EAP
PEAP
LEAP
MAC filter
Disable SSID broadcast
TKIP
Quantitative vs. qualitative
Vulnerabilities
Threat vectors
Probability / threat likelihood
Risk-avoidance, transference, acceptance, mitigation, deterrence
Risks associated with Cloud Computing and Virtualization
Recovery time objective and recovery point objective
Summarize various types of attacks
Man-in-the-middle
DDoS
DoS
Replay
Smurf attack
Spoofing
Spam
Phishing
Spim
Vishing
Spear phishing
Xmas attack
Pharming
Privilege escalation
Malicious insider threat
DNS poisoning and ARP poisoning
Password attacks
Brute force
Dictionary attacks
Explain types of wireless attacks
Rogue access points
Jamming/Interference
Evil twin
War driving
Bluejacking
Bluesnarfing
War chalking
IV attack
Packet sniffing
Near field communication
Replay attacks
WEP/WPA attacks
WPS attacks
Explain types of application attacks
Cross-site scripting
SQL injection
LDAP injection
XML injection
Directory traversal/command injection
Buffer overflow
Integer overflow
Zero-day
Cookies and attachments
LSO (Locally Shared Objects)
Flash Cookies
Malicious add-ons
Session hijacking
Header manipulation
Arbitrary code execution / remote code execution
Monitoring system logs
Event logs
Audit logs
Security logs
Access logs
For Further Details about RHCE: Click hear