on August 11-15, 2008
Course Fee: 22,500+12%VAT
Duration: 5days; 9am-5pm; M-F
Objective
This course looks at the network security in defensive view. The Linux Security program is designed to provide Expert skills needed to analyze the internal and external security threats against a network, and to develop / design / configure, security systems / appliances / applications that will protect an organization's information.
Students will learn how to evaluate network and Internet security issues and design. In addition, they will learn how to build a security appliance using the Linux OS and GPL Application.
This Course covers following courses:
· EC-Council Linux Security
· Novell SuSE Linux Administration
Course Outline/Agenda
Module1: General Considerations & Definition of Terms
Creating a security concept
Understanding the basics of a security concept
Performing a communication analysis
Analyzing protection requirements
Analyzing the current security situation and necessary enhancements
Module2: Designing Linux box for UTM Appliance
Installation & Configuration of Linux OS for Security Device
Hardening OS & Kernel
Installation for required services
Module3: Linux Networking Fundamentals
Explain the purposes and development of computer networking
Identify common types of networking hardware
Describe how networking software operates
Understand when popular networking protocols are used
Define network routing and describe the purpose of popular routing protocols
Module4: Configuring Basic Linux Networking
Describe how networking devices differ from other Linux devices
Configure Linux networking using scripts and text-mode utilities
Configure Linux networking using popular graphical utilities
Effectively use networking utilities to test a network and troubleshoot networking problems
Module5: Designing Firewalls over Linux
General Firewall Design
Understanding Firewall Concepts and Purpose
Describing firewall components
Packet Filters
Application-Level Gateways
Demilitarized Zone
Understanding Advantages and Disadvantages of firewall configurations
Packet Filters
Application-Level Gateways
Packet Filters
Understanding Packet Filters
Routing
Stateful Packet Filters
Understanding Advanced Firewall Features & Server
Design Firewall Appliance
Design / Configure smart GUI for Firewall Appliance
Understanding Network Address Translation (NAT)
Masquerading
NAT
PAT (Port Address Translation)
Module6: Designing VPN Appliances
Site to Site VPN Appliance
Client to Site VPN Appliance
Discussing
Module7: Setting up Secure Device Administration
Module8: Designing Internet Content Filter
Module9: Configuring Secure DNS Server
Module10: Designing IDS / IPS Appliance
Host Based Intrusion Detection System
Network Based Intrusion Detection System
Placing IDS / IPS to the Network
Module11: Configuring Secure DHCP Server
Module12: Design Vulnerability Scanning Appliance
Module13: Design Secure Email Server
Module14: Setting up secure sFTP Server
Module15: Design Security Audit Appliance
Module16: Security, Ethics and Privacy
List security risks typical in modern networked computer systems
Understand how to assess risk and create a security policy
Describe the function of top security-awareness organizations
Outline the role of the government in security and privacy
Module17: Making Data Secure
Explain commonly used cryptographic systems
Understand digital certificates and certificate authorities
Use the PGP and CPG data-encryption utilities
Describe different ways in which cryptography is applied to make computer systems more secure.
Module18: User Security
Follow good password security practices
Use Common utilities to promote user security
Module19: File Security
Correctly set up special Linux file permissions
Monitor log files to check for suspicious system activity
Automate checks for file integrity and unauthorized modifications
Module20: UTM Appliance deployment in real life scenarios
Positioning UTM Appliances
Deployment of appliance in production network
About the Speaker:
Mr. Islam is something of an expert when it comes to evaluating security products"
said Juniper Networks (2006)
Professional Profile
Almost 10 years of experience in designing networks and IT Security Infrastructure. Extensive knowledge and hands-on experience on Information Security for mission critical environments, Implemented high-end Security Products & Policies based on ISO 17799 & BS 7799 standards for more than 25 enterprises & various Mid-level enterprises all around the world. Awarded as Master of IT by Juniper http://www.masterofit.net in 2006, CEH (Certified Ethical Hacker), ECSA (EC-Certified Security Analyst).
Currently Mr. Islam is serving one of the largest Govt. Ministry of Kuwait as Network Security Consultant / Architect
Mr. Islam did consulting for various products like: Cisco Security Appliances, UTM Appliances (Firewall, IDS, AntiSPAM, Antivirus), Astaro Security Linux Appliances etc., Juniper, Snort / SAM / ACID names of few
ENROLL NOW!
GLOBAL KNOWLEDGE ASSOCIATES INC.
25th flr. Unit no. 2502b West Tower Philippine Stock Exchange, Ortigas Center Pasig City, 1605 Philippines
Tel. No. (632) 683-0969 / 637-3657 Mobile: +63 920-709-8298
Email: sandra@globalknowledgeph.com Email2: sandramedalla@gmail.com
URL: www.gkphilippines.com
--
Network Security Consultant
CEH (Certified Ethical Hacker), ECSA (EC-Security Analyst) ,
Juniper Networks Master of IT
http://www.masterofit.net/index.php?filter=deck&cid=1