Course CatalogDemo CourseUpcoming CoursesTechnical SupportTraining Center   Back to Training Home


 Other Courses in the Curriculum
 General Security Concepts
 NetWork Infrastructure Security - Part 2
 Communication Security
 Cryptography Concepts
 Operational and Organizational Security

Course Name Network Infrastructure Security - Part 1
Audience This curriculum is targeted at individuals working in the IT field and having general knowledge of security-related topics. Professionals who are striving to get TruSecure ICSA Certified Security Associate (TICSA) or Certified Information Systems Security Professional (CISSP) or CompTIA Security+ certification form the core audience for this course. 
Course Requirements You need Microsoft Internet Explorer 5.0 or above OR Netscape Navigator/Communicator 4.78 or above.

Plug-in Requirements
Macromedia Shockwave plug-in for Windows for IE/NN
Macromedia Flash plug-in for Windows for IE/NN

Note: Macromedia Flash plug-in comes built in with IE 5.5 and above and NN 6.x. To download the plug-ins, click on the relevant icon below.

 
Pre-requisites Two years of computer networking experience, complete knowledge of TCP/IP, and A+ or Network+ certification. 
Course Duration 5.5  hours
Course Objectives This course covers concepts that help you build network infrastructure security. It will detail the learner about intrusion points, intrusion detection systems, intrusion detection methods, and incident response. It will also teach the learner about various connectivity devices and transmission and storage media. After completing this course, the student will be able to identify the:
  • key concepts related to routers.
  • features of modems.
  • features of Hubs and Switches.
  • security-related features of wireless devices.
  • features of a Remote Access Service (RAS) server.
  • features of Virtual Private Networks (VPNs).
  • security-related features of Private Branch Exchange (PBX) systems.
  • basic concepts of firewalls.
  • features of various firewall technologies.
  • features of Intrusion Detection Systems (IDSs).
  • features of honeypots and honeynets.
  • characteristics of Network-Based Intrusion Detection Systems (NIDSs).
  • characteristics of Host-Based Intrusion Detection Systems (HIDSs).
  • features of passive and active response types.
  • features of various intrusion detection methods.
  • features of an incident response.
  • security-related features of various physical transmission media.
  • security-related features of various magnetic storage media.
  • security-related features of optical storage media.
  • security-related features of solid-state storage media.
  • need of network monitoring tools.
  • ways to monitor and secure workstations.
  • ways to monitor and secure servers.
  • ways to secure mobile devices.
  •  
Course Outline
  1. Network Devices
    1. Routers and Modems
    2. Hubs and Switches
    3. Wireless Devices
    4. Quiz
  2. Network Architecture
    1. RAS Server
    2. VPNs
    3. PBX Systems
    4. Quiz
  3. Firewalls
    1. Introduction to Firewalls
    2. Firewall Technologies
    3. Quiz
  4. Intrusion Detection
    1. Basics of ID
    2. NIDSs and HIDSs
    3. ID Response Types and Methods
    4. Incident Response
    5. Quiz
  5. Transmission and Removable Storage Media
    1. Physical Transmission Media
    2. Magnetic Storage Media Security
    3. Optical Storage Media
    4. Solid-State Storage Media
    5. Quiz
  6. Monitoring and Securing Network Resources
    1. Network Monitoring and Diagnostics
    2. Monitoring and Securing Workstations
    3. Monitoring and Securing Servers
    4. Securing Mobile Devices
    5. Quiz