Computer Network and Defense Fundamentals
o Network Fundamentals
o Network Components
o TCP/IP Networking Basics
o TCP/IP Protocol Stack
o IP Addressing
o Computer Network Defense (CND)
o CND Triad
o CND Process
o CND Actions
o CND Approaches
Network Security Threats, Vulnerabilities, and Attacks
o Essential Terminologies
o Network Security Concerns
o Network Security Vulnerabilities
o Network Reconnaissance Attacks
o Network Access Attacks
o Denial of Service (DoS) Attacks
o Distributed Denial-of-Service Attack (DDoS)
o Malware Attacks
Network Security Controls, Protocols, and Devices
o Fundamental Elements of Network Security
o Network Security Controls
o User Identification, Authentication, Authorization and Accounting
o Types of Authorization Systems
o Authorization Principles
o Cryptography
o Network Security Devices
o Network Security Protocols
Network Security Policy Design and Implementation
o What is Security Policy?
o Internet Access Policies
o Acceptable-Use Policy
o User-Account Policy
o Remote-Access Policy
o Information-Protection Policy
o Firewall-Management Policy
o Special-Access Policy
o Network-Connection Policy
o Business-Partner Policy
o Email Security Policy
o Passwords Policy
o Physical Security Policy
o Information System Security Policy
o Bring Your Own Devices (BYOD) Policy
o Software/Application Security Policy
o Data Backup Policy
o Confidential Data Policy
o Data Classification Policy
o Internet Usage Policies
o Server Policy
o Wireless Network Policy
o Incidence Response Plan (IRP)
o User Access Control Policy
o Switch Security Policy
o Intrusion Detection and Prevention (IDS/IPS) Policy
o Personal Device Usage Policy
o Encryption Policy
o Router Policy
o Security Policy Training and Awareness
o ISO Information Security Standards
o Payment Card Industry Data Security Standard (PCI-DSS)
o Health Insurance Portability and Accountability Act (HIPAA)
o Information Security Acts: Sarbanes Oxley Act (SOX)
o Information Security Acts: Gramm-Leach-Bliley Act (GLBA)
o Information Security Acts: The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
o Other Information Security Acts and Laws
Physical Security
o Physical Security
o Access Control Authentication Techniques
o Physical Security Controls
o Other Physical Security Measures
o Workplace Security
o Personnel Security: Managing Staff Hiring and Leaving Process
o Laptop Security Tool: EXO5
o Environmental Controls
o Physical Security: Awareness /Training
o Physical Security Checklists
Host Security
o Host Security
o OS Security
o Linux Security
o Securing Network Servers
o Hardening Routers and Switches
o Application/software Security
o Data Security
o Virtualization Security
Secure Firewall Configuration and Management
o Firewalls and Concerns
o What Firewalls Does?
o What should you not Ignore?: Firewall Limitations
o How Does a Firewall Work?
o Firewall Rules
o Types of Firewalls
o Firewall Technologies
o Firewall Topologies
o Firewall Rule Set & Policies
o Firewall Implementation
o Firewall Administration
o Firewall Logging and Auditing
o Firewall Anti-evasion Techniques
o Why Firewalls are Bypassed?
o Full Data Traffic Normalization
o Data Stream-based Inspection
o Vulnerability-based Detection and Blocking
o Firewall Security Recommendations and Best Practices
o Firewall Security Auditing Tools
Secure IDS Configuration and Management
o Intrusions and IDPS
o IDS
o Types of IDS Implementation
o IDS Deployment Strategies
o Types of IDS Alerts
o IPS
o IDPS Product Selection Considerations
o IDS Counterparts
Secure VPN Configuration and Management
o Understanding Virtual Private Network (VPN)
o How VPN works?
o Why to Establish VPN ?
o VPN Components
o VPN Concentrators
o Types of VPN
o VPN Categories
o Selecting Appropriate VPN
o VPN Core Functions
o VPN Technologies
o VPN Topologies
o Common VPN Flaws
o VPN Security
o Quality Of Service and Performance in VPNs
Wireless Network Defense
o Wireless Terminologies
o Wireless Networks
o Wireless Standard
o Wireless Topologies
o Typical Use of Wireless Networks
o Components of Wireless Network
o WEP (Wired Equivalent Privacy) Encryption
o WPA (Wi-Fi Protected Access) Encryption
o WPA2 Encryption
o WEP vs. WPA vs. WPA2
o Wi-Fi Authentication Method
o Wi-Fi Authentication Process Using a Centralized Authentication Server
o Wireless Network Threats
o Bluetooth Threats
o Wireless Network Security
o Wi-Fi Discovery Tools
o Locating Rogue Access points
o Protecting from Denial-of-Service Attacks: Interference
o Assessing Wireless Network Security
o Wi-Fi Security Auditing Tool: AirMagnet WiFi Analyzer
o WPA Security Assessment Tool
o Wi-Fi Vulnerability Scanning Tools
o Deploying Wireless IDS (WIDS) and Wireless IPS (WIPS)
o WIPS Tool
o Configuring Security on Wireless Routers
o Additional Wireless Network Security Guidelines
Network Traffic Monitoring and Analysis
o Network Traffic Monitoring and Analysis(Introduction)
o Network Monitoring: Positioning your Machine at Appropriate Location
o Network Traffic Signatures
o Packet Sniffer: Wireshark
o Detecting OS Fingerprinting Attempts
o Detecting PING Sweep Attempt
o Detecting ARP Sweep/ ARP Scan Attempt
o Detecting TCP Scan Attempt
o Detecting SYN/FIN DDOS Attempt
o Detecting UDP Scan Attempt
o Detecting Password Cracking Attempts
o Detecting FTP Password Cracking Attempts
o Detecting Sniffing (MITM) Attempts
o Detecting the Mac Flooding Attempt
o Detecting the ARP Poisoning Attempt
o Additional Packet Sniffing Tools
o Network Monitoring and Analysis
o Bandwidth Monitoring
Network Risk and Vulnerability Management
o What is Risk?
o Risk Levels
o Risk Matrix
o Key Risk Indicators(KRI)
o Risk Management Phase
o Enterprise Network Risk Management
o Vulnerability Management
o Module 13: Data Backup and Recovery
o Introduction to Data Backup
o RAID (Redundant Array Of Independent Disks) Technology
o Storage Area Network (SAN)
o Network Attached Storage (NAS)
o Selecting Appropriate Backup Method
o Choosing the Right Location for Backup
o Backup Types
o Conducting Recovery Drill Test
o Data Recovery
o Windows Data Recovery Tool
o RAID Data Recovery Services
o SAN Data Recovery Software
o NAS Data Recovery Services
Network Incident Response and Management
o Incident Handling and Response
o Incident Response Team Members: Roles and Responsibilities
o First Responder
o Incident Handling and Response Process
o Overview of IH&R Process Flow