Linux Expert+ Security Program

on August 11-15, 2008

Course Fee: 22,500+12%VAT

Duration: 5days; 9am-5pm; M-F

Objective

This course looks at the network security in defensive view. The Linux Security program is designed to provide Expert skills needed to analyze the internal and external security threats against a network, and to develop / design / configure, security systems / appliances / applications that will protect an organization's information.

Students will learn how to evaluate network and Internet security issues and design. In addition, they will learn how to build a security appliance using the Linux OS and GPL Application.

This Course covers following courses:

· EC-Council Linux Security

· Novell SuSE Linux Administration

Course Outline/Agenda

Module1: General Considerations & Definition of Terms

Creating a security concept

Understanding the basics of a security concept

Performing a communication analysis

Analyzing protection requirements

Analyzing the current security situation and necessary enhancements

Module2: Designing Linux box for UTM Appliance

Installation & Configuration of Linux OS for Security Device

Hardening OS & Kernel

Installation for required services

Module3: Linux Networking Fundamentals

Explain the purposes and development of computer networking

Identify common types of networking hardware

Describe how networking software operates

Understand when popular networking protocols are used

Define network routing and describe the purpose of popular routing protocols

Module4: Configuring Basic Linux Networking

Describe how networking devices differ from other Linux devices

Configure Linux networking using scripts and text-mode utilities

Configure Linux networking using popular graphical utilities

Effectively use networking utilities to test a network and troubleshoot networking problems

Module5: Designing Firewalls over Linux

General Firewall Design

Understanding Firewall Concepts and Purpose

Describing firewall components

Packet Filters

Application-Level Gateways

Demilitarized Zone

Understanding Advantages and Disadvantages of firewall configurations

Packet Filters

Application-Level Gateways

Packet Filters

Understanding Packet Filters

Routing

Stateful Packet Filters

Understanding Advanced Firewall Features & Server

Design Firewall Appliance

Design / Configure smart GUI for Firewall Appliance

Understanding Network Address Translation (NAT)

Masquerading

NAT

PAT (Port Address Translation)

Module6: Designing VPN Appliances

Site to Site VPN Appliance

Client to Site VPN Appliance

Discussing

Module7: Setting up Secure Device Administration

Module8: Designing Internet Content Filter

Module9: Configuring Secure DNS Server

Module10: Designing IDS / IPS Appliance

Host Based Intrusion Detection System

Network Based Intrusion Detection System

Placing IDS / IPS to the Network

Module11: Configuring Secure DHCP Server

Module12: Design Vulnerability Scanning Appliance

Module13: Design Secure Email Server

Module14: Setting up secure sFTP Server

Module15: Design Security Audit Appliance

Module16: Security, Ethics and Privacy

List security risks typical in modern networked computer systems

Understand how to assess risk and create a security policy

Describe the function of top security-awareness organizations

Outline the role of the government in security and privacy

Module17: Making Data Secure

Explain commonly used cryptographic systems

Understand digital certificates and certificate authorities

Use the PGP and CPG data-encryption utilities

Describe different ways in which cryptography is applied to make computer systems more secure.

Module18: User Security

Follow good password security practices

Use Common utilities to promote user security

Module19: File Security

Correctly set up special Linux file permissions

Monitor log files to check for suspicious system activity

Automate checks for file integrity and unauthorized modifications

Module20: UTM Appliance deployment in real life scenarios

Positioning UTM Appliances

Deployment of appliance in production network

About the Speaker:

Mr. Islam is something of an expert when it comes to evaluating security products"

said Juniper Networks (2006)

Professional Profile

Almost 10 years of experience in designing networks and IT Security Infrastructure. Extensive knowledge and hands-on experience on Information Security for mission critical environments, Implemented high-end Security Products & Policies based on ISO 17799 & BS 7799 standards for more than 25 enterprises & various Mid-level enterprises all around the world. Awarded as Master of IT by Juniper http://www.masterofit.net in 2006, CEH (Certified Ethical Hacker), ECSA (EC-Certified Security Analyst).


Currently Mr. Islam is serving one of the largest Govt. Ministry of Kuwait as Network Security Consultant / Architect

Mr. Islam did consulting for various products like: Cisco Security Appliances, UTM Appliances (Firewall, IDS, AntiSPAM, Antivirus), Astaro Security Linux Appliances etc., Juniper, Snort / SAM / ACID names of few

ENROLL NOW!

GLOBAL KNOWLEDGE ASSOCIATES INC.

25th flr. Unit no. 2502b West Tower Philippine Stock Exchange, Ortigas Center Pasig City, 1605 Philippines

Tel. No. (632) 683-0969 / 637-3657 Mobile: +63 920-709-8298

Email: sandra@globalknowledgeph.com Email2: sandramedalla@gmail.com

URL: www.gkphilippines.com

--
Network Security Consultant
CEH (Certified Ethical Hacker), ECSA (EC-Security Analyst) , Juniper Networks Master of IT
http://www.masterofit.net/index.php?filter=deck&cid=1

EC-Council ECSA/LPT Certification Bootcamp

Schedule

June 23-27, 2008


Duration / Course fee
5 days (9:00 – 5:00) php65,000.00+VAT/person, inclusive of ECSA Exam, Kit and Meal.

Exam
The ECSA certification exam will be conducted on the last day of training. Students need to pass the online Prometric exam 412-79 to receive the ECSA certification. The Student also will be prepared for the LPT certification.

Discount:

Please call 683-0969 / 637-3657 / 0920-709-8298 and look for Sandra.

Course Description

ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.

EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Who Should Attend
Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.

Course Outline v3

Module 1: The Need for Security Analysis

Module 2: Advanced Googling

Module 3: TCP/IP Packet Analysis

Module 4: Advanced Sniffing Techniques

Module 5: Vulnerability Analysis with Nessus

Module 6: Advanced Wireless Testing

Module 7: Designing a DMZ

Module 8: Snort Analysis

Module 9: Log Analysis

Module 10: Advanced Exploits and Tools

Module 11: Penetration Testing Methodologies

Module 12: Customers and Legal Agreements

Module 13: Penetration Testing Planning and Scheduling

Module 14: Pre Penetration Testing Checklist

Module 15: Information Gathering

Module 16: Vulnerability Analysis

Module 17: External Penetration Testing

Module 18: Internal Network Penetration Testing

Module 19: Router Penetration Testing

Module 20: Firewall Penetration Testing

Module 21: IDS Penetration Testing

Module 22: Wireless Network Penetration Testing

Module 23: Denial of Service Penetration Testing

Module 24: Password Cracking Penetration Testing

Module 25: Social Engineering Penetration Testing

Module 26: Stolen Laptop Penetration Testing

Module 27: Application Penetration Testing

Module 28: Physical Security Penetration Testing

Module 29: Database Penetration testing

Module 30: VoIP Penetration Testing

Module 31: VPN Penetration Testing

Module 32: Penetration Testing Report Analysis

Module 33: Penetration Testing Report and Documentation Writing

Module 34: Penetration Testing Deliverables and Conclusion

Module 35: Ethics of a Licensed Penetration Tester

To Register

Please call 683-0969 / 637-3657 and look for Sandra.

GLOBAL KNOWLEDGE ASSOCIATES INC
25th flr. Unit no. 2502b West Tower Philippine Stock Exchange, Ortigas Center Pasig City , 1605 Philippines
Tel. No. (632) 683-0969 / 637-3657 Mobile No.: (+63) 920-709-8298
Email: sandra@globalknowledgeph.com YM: sandra_medalla@yahoo.com
URL: www.gkphilippines.com


EC-Council ECSA/LPT Certification Bootcamp

Schedule

June 23-27, 2008


Duration / Course fee
5 days (9:00 – 5:00) php65,000.00+VAT/person, inclusive of ECSA Exam, Kit and Meal.

Exam
The ECSA certification exam will be conducted on the last day of training. Students need to pass the online Prometric exam 412-79 to receive the ECSA certification. The Student also will be prepared for the LPT certification.

Discount:

Please call 683-0969 / 637-3657 / 0920-709-8298 and look for Sandra.

Course Description

ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth Advanced Hacking and Penetration Testing class available that covers testing in all modern infrastructures, operating systems and application environments.

EC-Council’s Certified Security Analyst/LPT program is a highly interactive 5-day security class designed to teach Security Professionals the advanced uses of the LPT methodologies, tools and techniques required to perform comprehensive information security tests. Students will learn how to design, secure and test networks to protect your organization from the threats hackers and crackers pose. By teaching the tools and ground breaking techniques for security and penetration testing, this class will help you perform the intensive assessments required to effectively identify and mitigate risks to the security of your infrastructure. As students learn to identify security problems, they also learn how to avoid and eliminate them, with the class providing complete coverage of analysis and network security-testing topics.

Who Should Attend
Network server administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals.

Course Outline v3

Module 1: The Need for Security Analysis

Module 2: Advanced Googling

Module 3: TCP/IP Packet Analysis

Module 4: Advanced Sniffing Techniques

Module 5: Vulnerability Analysis with Nessus

Module 6: Advanced Wireless Testing

Module 7: Designing a DMZ

Module 8: Snort Analysis

Module 9: Log Analysis

Module 10: Advanced Exploits and Tools

Module 11: Penetration Testing Methodologies

Module 12: Customers and Legal Agreements

Module 13: Penetration Testing Planning and Scheduling

Module 14: Pre Penetration Testing Checklist

Module 15: Information Gathering

Module 16: Vulnerability Analysis

Module 17: External Penetration Testing

Module 18: Internal Network Penetration Testing

Module 19: Router Penetration Testing

Module 20: Firewall Penetration Testing

Module 21: IDS Penetration Testing

Module 22: Wireless Network Penetration Testing

Module 23: Denial of Service Penetration Testing

Module 24: Password Cracking Penetration Testing

Module 25: Social Engineering Penetration Testing

Module 26: Stolen Laptop Penetration Testing

Module 27: Application Penetration Testing

Module 28: Physical Security Penetration Testing

Module 29: Database Penetration testing

Module 30: VoIP Penetration Testing

Module 31: VPN Penetration Testing

Module 32: Penetration Testing Report Analysis

Module 33: Penetration Testing Report and Documentation Writing

Module 34: Penetration Testing Deliverables and Conclusion

Module 35: Ethics of a Licensed Penetration Tester

To Register

Please call 683-0969 / 637-3657 and look for Sandra.

GLOBAL KNOWLEDGE ASSOCIATES INC
25th flr. Unit no. 2502b West Tower Philippine Stock Exchange, Ortigas Center Pasig City , 1605 Philippines
Tel. No. (632) 683-0969 / 637-3657 Mobile No.: (+63) 920-709-8298
Email: sandra@globalknowledgeph.com YM: sandra_medalla@yahoo.com
URL: www.gkphilippines.com

New blackmailing Trojan encrypts files using high-grade 1024-bit RSA key

By Gregg Keizer

June 8, 2008 (Computerworld) A security company on Friday asked for help cracking an encryption key central to an extortion scheme that demands money from users whose PCs have been infected by malware.

Kaspersky Lab, a Moscow-based antivirus firm, put out the call for assistance after it discovered a new variant of Gpcode, a Trojan horse that has been used in isolated "ransomware" attacks for the past two years.

In ransomware attacks, hackers plant malware that encrypts files and then displays a message demanding money to unlock the data. In the case of the newest Gpcode, 143 different file types are encrypted, including .bak, .doc, .jpg and .pdf.

Read more here.

New blackmailing Trojan encrypts files using high-grade 1024-bit RSA key

By Gregg Keizer

June 8, 2008 (Computerworld) A security company on Friday asked for help cracking an encryption key central to an extortion scheme that demands money from users whose PCs have been infected by malware.

Kaspersky Lab, a Moscow-based antivirus firm, put out the call for assistance after it discovered a new variant of Gpcode, a Trojan horse that has been used in isolated "ransomware" attacks for the past two years.

In ransomware attacks, hackers plant malware that encrypts files and then displays a message demanding money to unlock the data. In the case of the newest Gpcode, 143 different file types are encrypted, including .bak, .doc, .jpg and .pdf.

Read more here.