Curso Defending the Perimeter from Cyber Attacks

  • Redes & Infraestrutura de TI

Curso Defending the Perimeter from Cyber Attacks

24h
Objetivo

Após concluir este Curso Defending the Perimeter from Cyber Attacks, você será capaz de:

  • Fortaleça o perímetro da rede para fornecer uma defesa integrada
  • Previna ou mitigue os efeitos de ataques à rede com um firewall
  • Detecte e responda a ataques de rede com detecção e prevenção de invasões (IDP)
  • Projetar, instalar e configurar redes privadas virtuais seguras
  • Mitigar o impacto dos ataques de negação de serviço (DoS)
Publico Alvo
  • Este Curso Defending the Perimeter from Cyber Attacks destina-se a profissionais de segurança que buscam o conhecimento e as habilidades para fortalecer o perímetro da rede para fornecer uma defesa integrada.

 

Materiais
Inglês/Português/Lab Pratico
Conteúdo Programatico

Setting Your Security Objectives

  • Defining security principles
  1. Ensuring data Confidentiality, Integrity and Availability (CIA)
  2. Assessing defensive techniques
  3. Setting a generic security stance
  • Developing a security policy
  1. Balancing risk with business requirements
  2. Identifying your information assurance objectives
  3. Choosing security technologies

Deploying a Secure Firewall

  • Installing a firewall
  1. Determining the appropriate firewall type
  2. Selecting and hardening the operating system
  3. Virtualizing the firewall appliance
  • Configuring a firewall to support outgoing services
  1. Supporting simple services: HTTP, SMTP
  2. Filtering dangerous content and handling encrypted traffic
  3. Managing complex services: VoIP, audio and video
  • Providing external services securely
  1. Implementing publicly accessible servers
  2. Building a DMZ architecture
  3. Supporting SMTP mail
  • Allowing access to internal services
  1. Customizing DNS for firewall architectures
  2. Configuring Network Address Translation (NAT)
  3. Developing access lists for client server applications

Detecting and Preventing Intrusion

  • Deploying an IDS
  1. Placing Network IDS (NIDS) within your network architecture
  2. Operating sensors in stealth mode
  • Detecting intrusions in the enterprise
  1. Designing a multi-layer IDS hierarchy
  2. Managing distributed IDS
  • Interpreting alerts
  1. Verifying IDS operation
  2. Minimizing false positives and negatives
  3. Validating IDS events and recognizing attacks
  • Stopping intruders
  1. Exploiting IDS active responses
  2. Snipping a TCP session
  3. Controlling access with a firewall update

Configuring Remote User Virtual Private Networks (VPNs)

  • Building VPN tunnels
  1. Compulsory vs. voluntary tunnels
  2. Supporting remote users with layer 2 tunnels
  3. Connecting remote sites with layer 3 tunnels
  • Deploying client software
  1. Assessing remote access VPN alternatives
  2. Implementing remote user authentication
  3. Leveraging Layer 2 Tunneling Protocol (L2TP)
  4. Protecting L2TP tunnels with IPsec Transport Mode

Creating Site-to-Site VPNs

  • Applying cryptographic protection
  1. Ensuring confidentiality with symmetric encryption
  2. Exchanging symmetric keys with asymmetric encryption
  3. Checking message integrity with hashing
  4. Managing digital certificates with PKI
  • Comparing tunneling and protection methods
  1. Employing VPN concentrators and VPN-capable routers
  2. Applying IPsec Tunnel Mode
  3. Assessing tunneling protocols
  4. Evaluating VPN topologies

Integrating Perimeter Defenses

  • Reducing the impact of denial-of-service (DoS) attacks
  1. Mitigating bombardment attacks
  2. Rejecting connection-based attacks with IPSs
  3. Blackholing and sinkholing
  4. Implementing a DoS Defense System (DDS)
  5. Blacklisting attack sites and address ranges
  • Perimeter architectures
  1. Integrating IDS and VPNs with your firewall architecture
  2. Positioning externally accessible servers
  3. Monitoring and controlling wireless networks
TENHO INTERESSE

Cursos Relacionados

Curso CISCO CCNA Exame CCNA 200-125

40 horas

Curso SAP BASIS S4hana - Administração e Infraestrutura

40 horas

Curso MCSA Networking with Windows Server 2016

40 horas

Curso CCNP Route 300-101 Preparatório Para Certificação

40 horas

Curso Cloudera Cientista de Dados

32 horas

Curso VMware Instalando Configurando e Gerenciando vSphere

32 horas

Curso de Redes TCP/IP - Protocolo de Redes de Computadores

40 horas

Curso Cisco Switched Networks 300-115

40 horas

Curso Wireless LAN Foundations

16 horas

Curso Certified Network Defender Certification

40 horas