H. D. SP Energy Networks
T. E. FP Mailing
Cyber security for engineers training course contents
Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response.
IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats.
Hands on: port scanning, use a “hacking” tool.
Client and Server security
Windows, Linux, Log files, syslogd, accounts, data security.
Hands on: Server hardening.
What is a firewall? Firewall benefits, concepts.
Hands on: launching various attacks on a target.
Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products.
Hands on: Simple personal firewall configuration.
Packet filtering firewalls
Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering.
Hands on: Configuring packet filtering firewalls.
Stateful packet filtering
Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception.
Hands on: SPI firewalls.
Circuit level, application level, SOCKS. Proxy firewall plusses and minuses.
Hands on: Proxy firewalls.
Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP.
Hands on: Resilient firewall architecture.
Configuration checklist, testing procedure, monitoring firewalls, logging, syslog.
Hands on: Testing firewalls.
Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures.
Exercise: Password cracking.
Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS.
Exercise: Using certificates.
What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages.
VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels.
Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling.
Hands on: Implementing a L2TP tunnel.
AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues.
Hands on: Implementing an IPsec VPN.
Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates.
Hands on: Implementing a SSL VPN.
Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs.
Hands on: Implementing a MPLS L3 VPN.
Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology.
Hands on: Hacking tools and countermeasures.
Why Choose Us
SNT trainers score an average of over 90% on the three main areas of:
- Ability to teach
- Technical knowledge
- Answering questions
We limit our maximum class size to 8 delegates; often we have less than this. This ensures optimal interactivity between delegates and instructor.
"Excellent course. The small class size was a great benefit…" M.B. IBM
We write our own courses; courseware does not just consist of slides and our slides are diagrams not bullet point text. A typical chapter provides clearly defined objectives with a chapter overview, slides with text underneath, a quiz at the end to check the learning of the students. Hands on exercises are at the end and are used to reinforce the theory.