Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls.
Brief overview of the relevant headers.
Hands on Download software for course, use analyser to capture passwords on the wire.
Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response.
The Internet worm, IP spoofing, SYN attack,
hijacking, Ping o' Death… keeping up to date with
Hands on Use a port scanning tool, use a “hacking” tool.
Products, Packet filtering, DMZ, content filtering,
stateful packet inspection, Proxies, firewall
architectures, Intrusion Detection Systems,
Hands on Set up a firewall and prevent attacks.
NAT and PAT, Why use NAT, NAT-ALG, RSIP.
Encryption keys, Encryption strengths, Secret key
vs Public key, algorithms, systems, SSL, SSH,
Public Key Infrastructures.
Hands on Run a password-cracking program.
Types of authentication, Securid, Biometrics,
PGP, Digital certificates, X.509 v3, Certificate
authorities, CRLs, PPP authentication, RADIUS.
Hands on Using certificates.
Cookies, browser certificates, censorship, PICS.
Operating system security, Web server user
authentication, Restricting access, Logging,
Securing CGI scripts.
Hands on Browser security.
What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.
"A good intro to a complex subject."
"Course was a real eye-opener to some of the barriers we encounter."
This structured training course seeks to build upon workbook learning through the use of group exercises, dynamic discussion and individual tasks in order to deliver an engaging and interactive module that will ensure all candidates are able to transfer their new skills into the workplace.