IPv6 Security Training | IP Version 6 Security Training

IPv6 Security Training | IP Version 6 Security Training

Introduction:

IPv6 Security Training | IP Version 6 Security Training with real world hands-on labs

In this in-depth IPv6 Security Training | IP Version 6 Security Training program you will understand the techniques used by attackers to break in to systems, and also learn different ways in which you can prevent such an occurrence. Make sure that no loophole no vulnerability is overlooked and eliminate all possibilities of a potential cyber attack.

The introduction of IPv6 has changed the network landscape forever. And any organization integrating the next generation protocol must contend with the new security paradigm IPv6 creates. Even organizations not deploying IPv6 today may find their security policies challenged by the widespread availability of IPv6 support in operating systems and network hardware and the ease with which it can be enabled. Irregardless of an organization's IPv6 adoption plan, the key to securing tomorrow's network is an understanding of the relationship between IPv4 and IPv6 on multi-protocol networks, security issues associated with transition, and knowing the current mitigation techniques and best practices for a successful and secure IPv6 deployment

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Audience/Target Group

This course is highly recommended for Network Administrators, Network Engineers, Penetration Testers, Security Administrators, and Security Professionals in general.

IPv6 Security Training | IP Version 6 Security trainingRelated Courses:

Duration: 3-4 days

Skilled Gained:

Understand the basics of IPv6
Understand the basics of IPv6 Security
Secure IPv6 networks against threats and attacks
Analyze and react to denial-of-service (DoS) attacks
Implement security standards and processes to protect your IPv6 network
Create a secure IPv6 infrastructure

Course Content:

Introduction to IPv6
IPv6 in a nutshell
Larger address space
Hierarchical addressing
Stateless and stateful address configuration
Built-in security
Extensibility
New IPv6 header
Mobility
Large address space
IPv6 Header Format
IPv4 Compatibility
IPv6 Operation
IPv6 Addressing Architecture
ICMPv6 and Neighbor Discovery Protocol
Using DNS and DHCP with IPv6
Supporting Security and Mobility with IPv6
Routing in IPv6 Networks
Using IPv6 services
IPv6 operation and Architecture
Basic transition mechanisms
Tunneling protocols create new risks
IPv6 autoconfiguration

Introduction to IPSec and Mobile IP
IPv4 security issues
Denial of service attacks (DOS)
Man-in-the-middle attacks
ARP poisoning and ICMP redirect
Port scanning as one of the best known reconnaissance Techniques IPv6 Features and benefits
Authentication and Confidentiality
IPsec architecture
The Security Policy Database (SPD)
Security Association Database (SAD)
Peer Authorization Database (PAD)
SA and Key Management
IP Traffic Processing
AH and ESP Headers AH and ESP security protocols
Tunnel mode and transport mode
Security policy (SP)
Selector
Security Association (SA), Key exchange protocols
Security Protocols
AH and ESP
Security Parameter Index (SPI)
Sequence Number
Virtual Private Networking (VPN)
Mobile IPv6
Wireless IP mobility
Roaming with IPv6
Mobile IPv6 applied to Wireless LANs, MANS and WANs
Basic Wireless LAN and cellular networks security
Mobile IP protocols and design
IPv6 deployment and migration

Introduction to IPv6 Security
IPv6 Security Essentials
Fundamental Principles and Strategies
Physical Security
Encryption
Digital Signatures
Public Key Infrastructure
Dealing with Technology Evolution
Network Security Awareness
Developing Security Policies, Assessments and Procedures
IPv6 Security Considerations and Recommendations
IPv6 Neighbor Discovery trust models and threats
Implementing Security for IPv6, Cisco Documentation
Security Implication of Mixed IPv4/IPv6 Network
IPv6 end-to-end security
IPv6 headers
IPv6 Extension Headers
Fragmentation
Routing Header
Privacy
Managing privacy extensions
IPsec, VPNs, IKE, PKI
IPv6 autoconfiguration creates addressing complexity

IPv6 and IPv4 Threat Comparison
Best-Practice Evaluation
Overview of IPv4 Topology and Best-Practice Security Rules
Threat Analysis Attacks with New Considerations in IPv6
Reconnaissance
Unauthorized Access
Header Manipulation and Fragmentation
Layer 3-Layer 4 Spoofing ARP and DHCP Attacks Broadcast Amplification Attacks (smurf)
Routing Attacks
Viruses and Worms
IPv6 and IPv4 Threat Comparison
Translation, Transition, and Tunneling Mechanisms
Attacks with Strong IPv4 and IPv6
Similarities
Sniffing
Application Layer Attacks
Rogue Devices
Man-in-the-Middle Attacks
Flooding
IPv6 and IPv4 Threat Comparison
IPv6 Security Considerations
Authorization for Automatically Assigned Addresses and Configurations
Protection of IP Packets
Host Protection from Scanning and Attacks
Control of What Traffic is Exchanged with the Internet
Reconnaissance Tools

IPv6 Network Vulnerabilities and Attacks
Detailed analysis of IPv6 headers
Elimination of NAT
Denial of Service (DoS) and Distributed Denial of Service (DDoS)
Ethernet LAN Security
Frame Relay Network Security: Vulnerabilities and Mitigations
ICMP Attacks
IPv6 Spoofing
ICMP, ICMP Attack, Ping Attack, Smurf Attack, PING Flood, Ping of Death
Land Attack
Network Security at the Data Link Layer (Layer 2) of LAN
Network Security at the Network Layer (Layer 3: IP)
Network Security at the Transport Layer (Layer 4: TCP and UDP)
Pharming and Anti-pharming Mitigations and Technologies
Phishing and Anti-phishing Mitigations and Technologies
Port Scan Attack
Public-Key or Asymmetric Cryptography
RIP Routing Attacks
Smurf Attack and Fraggle Attack
SPAM and Anti-Spam Technologies
Spyware and Anti-Spyware Mitigations and Technologies
TCP Connecting Hijacking: MAN-In-The-Middle Attack
TCP “SYN” Attack
TCP/IP Network Vulnerability and Security
UDP Flood Attack
Widely Used Attack Tools
Virus and Antivirus Technologies
Top Information and Networking Threats

IPV6 Security Audit & Control
Host- and Network-based Intrusion Detection
Firewalls and Honeypots
Vulnerability Scanners
Computer Security Policies
Password Managemen
Incident Handling
Information Warfare
Encryption
VPN’s, PKI, and PGP
Common Vulnerabilities in Wireless IPSec/VPN Deployments
Firewall Test, Port Scan, Spy Ware and Security Audit
Find Security Holes
IP VPN Services
Attacking IPsec VPNs
Check Point VPN Security Issues
Microsoft PPTP
VPN Services Countermeasures

IPv6 Risk Assessment and Auditing
Host and Network Based Intrusion Detection
Honeypots, Firewalls and Perimeter Protection
Security Policy
Information Warfare
Web Security
Network Fundamentals and IP Concepts and Behavior
Cisco Router Filters
Four Primary Threats for Perimeter Protection
PGP, Steganography
Anti-Viral Tools
Windows (2000, XP, NT, 98) IPv6 Security Administration and Auditing
IIS Security
Unix IPv6 Security

Firewalls, Perimeter Protection, and VPNs
IPv6 Stimulus/Response and Fragmentation
Complex IP Transports and Services
TCPdump, WINdump, Ethereal and Other Sniffers
Static Packet Filtering
Stateful Packet Filtering and Inspection
Proxies
Popular IPv6 Firewall Products
Implementing Security with Cisco Routers
Intrusion Detection
Centralized Logging
Firewall Log File Analysis
Log File Alerting
IPSec, SSL, and SSH
Designing a Secure Perimeter
Network and Host Based Auditing

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment