Security Essentials Training

Security Essentials Training


“Prevention is Ideal but Detection is a Must.” Security Essentials Training Course Hands-on

Security Essentials Training is focused on teaching you the essential information security skills and techniques you need to protect and secure your organization’s critical information assets and business systems. Our Security Essentials Training course will show you how to prevent your organization’s security problems from being headline news in the Wall Street Journal!

With the rise in advanced persistent threats, it is almost inevitable that organizations will be targeted. Whether the attacker is successful in penetrating an organization’s network depends on the effectiveness of the organization’s defense. Defending against attacks is an ongoing challenge, with new threats emerging all of the time, including the next generation of threats. Organizations need to understand what really works in cybersecurity. What has worked, and will always work, is taking a risk-based approach to cyber defense. Before your organization spends a dollar of its IT budget or allocates any resources or time to anything in the name of cybersecurity, three questions must be answered:

• What is the risk?
• Is it the highest priority risk?
• What is the most cost-effective way to reduce the risk?

Security is all about making sure you focus on the right areas of defense. In Security Essentials Training you will learn the language and underlying theory of computer and information security. You will gain the essential and effective security knowledge you will need if you are given the responsibility for securing systems and/or organizations. This Security Essentials Training course meets both of the key promises ENO makes to our students: (1) You will learn up-to-the-minute skills you can put into practice immediately upon returning to work; and (2) You will be taught by the best security instructors in the industry.

Security Essentials TrainingRelated Courses:

Duration:6 days

Skills Gained:

• Apply what you learned directly to your job when you go back to work
• Design and build a network architecture using VLANs, NAC, and 802.1x based on advanced persistent threat indicators of compromise
• Run Windows command line tools to analyze the system looking for high-risk items
• Run Linux command line tools (ps, ls, netstat, etc.) and basic scripting to automate the running of programs to perform continuous monitoring of various tools
• Install VMWare and create virtual machines to create a virtual lab to test and evaluate tools/security of systems
• Create an effective policy that can be enforced within an organization and design a checklist to validate security and create metrics to tie into training and awareness
• Identify visible weaknesses of a system using various tools and, once vulnerabilities are discovered, cover ways to configure the system to be more secure
• Build a network visibility map that can be used for hardening of a network – validating the attack surface and covering ways to reduce that surface by hardening and patching
• Sniff open protocols like telnet and ftp and determine the content, passwords, and vulnerabilities using WireShark.

Customize It:

With onsite Training, courses can be scheduled on a date that is convenient for you, and because they can be scheduled at your location, you don’t incur travel costs and students won’t be away from home. Onsite classes can also be tailored to meet your needs. You might shorten a 5-day class into a 3-day class, or combine portions of several related courses into a single course, or have the instructor vary the emphasis of topics depending on your staff’s and site’s requirements.

Course Content:

1. Networking Concepts

Setting Up a Lab with Virtual Machines
Network Fundamentals
Network types (LANs, WANs)
Network topologies
LAN protocols
WAN protocols
Network devices
IP Concepts
Packets and addresses
IP service ports
IP protocols
IP Behavior
TCP dump
Recognizing and understanding
UDP behavior
Virtual Machines

2. Defense In-Depth

Information Assurance Foundations
Defense in-depth
Confidentiality, integrity, and availability
Risk model
Authentication vs. authorization
Defense in-depth
Computer Security Policies
Elements when well written
How policies serve as insurance
Roles and responsibilities
Contingency and Continuity Planning
Business continuity planning (BCP)
Disaster recovery planning (DRP)
Business impact analysis
Access Control
Data classification
Authentication, authorization, accountability (AAA)
Password Management
Password cracking for Windows and Unix
Alternate forms of authentication (tokens, biometrics)
Single sign-on and RADIUS
Incident Response (IR)
Preparation, identification, and containment
Eradication, recovery, and lessons learned
Investigation techniques and computer crime
Legal issues associated with IR
Offensive and Defensive Information Warfare (IW)
Types of IW
Asymmetric warfare
Offensive goals
Attack Strategies and Methods
How the adversary breaks into systems
Mitnick attack
Attack methods

3. Internet Security Technologies

Vulnerability Scanning and Remediation
Approaches and methods of remediation
Building a network visibility map
Host identification
Port scanning
Vulnerability scanning
Penetration testing
Web Security
Web communication
Web security protocols
Active content
Cracking web applications
Web application defenses
Firewalls and Perimeters
Types of firewalls
Pros and cons of firewalls
Firewall placement
Packet filtering, stateful, and proxies
Honey tokens
Host-based Protection
Intrusion detection
Intrusion prevention
Pros and cons
Network-based Intrusion Detection and Prevention
Pros and cons
Deployment strategies
Development and advances

4. Secure Communications

Need for cryptography
Types of encryption
Digital substitution
Real-world cryptosystems
Crypto attacks
Types of remote access
Digital certificates
Key escrow
Critical Security Controls
Overview of the controls
Implementing the controls
Auditing the Controls
Specific controls and metrics
Risk Assessment and Auditing
Risk assessment methodology
Risk approaches
Calculating risk

5. Windows Security

Security Infrastructure
Windows family of operating systems
Workgroups and local accounts
What is Active Directory?
Domain users and groups
Kerberos, NTLMv2, smart cards
Forests and trusts
What is group policy?
Service Packs, Patches, and Backups
Service packs
E-mail security bulletins
Patch installation
Automatic updates
Windows server update services
Windows backup
System restore
Device driver rollback
Permissions and User Rights
NTFS permissions
File and print sharing service
Shared folders
BitLocker drive encryption
Security Policies and Templates
Group policy objects
Password policy
Lockout policy
Anonymous access
Software restriction policies
Securing Network Services
Firewalls and packet filtering
IPSec and VPNs
Wireless networking
Security configuration wizard
Remote desktop protocol (RDP)
Auditing and Automation
Microsoft baseline security analyzer
Windows event logs
NTFS and registry auditing
IIS logging
Creating system baselines
Scripting tools
Scheduling jobs

6. Unix/Linux Security

Linux Landscape
Different variants of and uses for Linux
Ways processes are started
Network interface information
Process information
Directory hierarchy
Partitions and OS installation
Permissions and User Accounts
Setting permissions
Controlling access
Root vs. user accounts
Setting password controls
Pluggable authentication module (PAM)
Linux OS Security
Dangerous services
Helpful services
Running and stopping programs
Configuration changes and restarting services
File system permissions, ownership, and systems
Mounting drives
Maintenance, Monitoring, and Auditing Linux
Common causes of compromise
Backing up data
Analyzing log files
Other logging
Linux Security Tools
File integrity verifications
CIS hardening guides
Bastille linux

Whether you are looking for general information or have a specific question, we want to help

Request More Information

Time Frame: 0-3 Months4-12 Months

No Comments Yet.

Leave a comment