New Learning | Premium Moodle Theme

ENSA: Certified Network Security Administrator Boot Camp

Description

This five-day course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

The EC-Council's NSA certification looks at the network security in defensive view while the CEH certification program looks at the security in offensive mode. The NSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

This course prepares students for EC-Council Exam 312-38 ENSA.

Prerequisites

Who should attend:

  • System administrators
  • Network administrators
  • Anyone who is interested in network security technologies
  • Those who plan to take the CEH course but lack the requisite experience
     

Curriculum

Module I: Fundamentals of Computer Network

  • Key elements of network
  • Logical Elements of Network
  • Types of network media
  • Media Access Methods
  • Critical information characteristics
  • Information states
  • Operations Security (OPSEC)
  • Object reuse(computer security)
  • OSI Model
  • Transmission Modes
  • Types of Transmission
  • Logical Network Classification
  • Network Topologies
  • Physical Network Classification
  • Network Equipments


Module II: Network Protocols

  • Introduction to protocols
  • Implementing Network protocols
  • Application Layer Protocols
  • Presentation Layer Protocol
  • Session Layer Protocol
  • Transport Layer Protocols
  • Network Layer Protocols
  • Data link Layer Protocol


Module III: Protocol Analysis

  • Overview of tcp/ip
  • Relation to other Protocol
  • TCP/IP Protocol suite
  • Windowing
  • Sliding Window
  • Acknowledgement
  • TCP
  • IP


Module IV: Hardening Physical Security

  • Need for physical security
  • Security Statistics
  • Physical Security Breach Incidents
  • Factors Affecting Physical Security
  • Physical Security Threats
  • Premises Security
  • EPS (Electronic Physical Security)
  • Challenges in Ensuring Physical Security
  • Mantrap
  • Physical Security Checklist


Module V: Network Security

  • Overview of Network Security
  • The need for network security
  • The goals of network security
  • Security awareness
  • Functions of Network security administrator
  • Communication Security (COMSEC)
  • Functions of INFOSEC Officer
  • Functions of information resources management staff
  • Program or functional managers
  • Security office
  • Senior management
  • System manager and system staff
  • Telecommunications office and staff
  • Functions of audit office
  • Functions of OPSEC managers
  • Role of end users
  • Network Security at:
  • Transmission Security
  • Legal Elements
  • Countermeasures: cover and deception
  • Reporting security violations


Module VI: Security Standards Organizations

  • Internet Corporation for Assigned Names and Numbers (ICANN)
  • International Organization for Standardization (ISO)
  • Consultative Committee For Telephone and Telegraphy (CCITT)
  • International Telecommunication Union (ITU)
  • American National Standards Institute(ANSI)
  • Institute Of Electronics and Electrical Engineers(IEEE)
  • Electronic Industries Association
  • National Center for Standards and Certification Information (NIST)
  • World Wide Web Consortium (W3C)
  • Web Application Security Consortium (WASC)


Module VII: Security Standards

  • Introduction to Internet Standards
  • Standards Creation Committee
  • Internet Standards
  • Cabling Standards
  • Specification Standards


Module VIII: Security Policy

  • Security Policy overview
  • Concept of Security Policy
  • Key Security Elements
  • Security Awareness Programs
  • Vital role of a security policy
  • Classification of Security policy
  • Contents of Security Policy
  • Privacy and Confidentiality
  • Security levels
  • Agency Specific AIS and Telecommunications Policies
  • Configuration of security policy
  • National Policy and Guidance
  • Implementation of security policy
  • Incident Handling and Escalation Procedures
  • Security operations and life cycle management
  • Defining Responses to Security Violations
  • Presenting and Reviewing the Process
  • Compliance with Law and Policy
  • Transborder encryption issues
  • Points To Remember While Writing Security Policy
  • Issue-specific Security Policy (ISSP)
  • Creating and Managing ISSPs


Module IX: IEEE Standards

  • Introduction to IEEE standards
  • IEEE LAN Protocol Specification
  • Wireless Networking Standards


Module X: Network Security Threats

  • Current Statistics
  • Types of Attackers
  • Classification of Hackers
  • Techniques
  • Common Vulnerabilities and Exposures (CVE)
  • Attacks
  • Hiding Evidence of an Attack
  • Problems Detecting Network Attacks
  • Network Scanning Tools


Module XI: Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS)

  • Introduction to IDS
  • History of Intrusion Detection
  • Intrusion Detection Concepts
  • IDS for an Organization
  • Characteristics of IDS
  • Aggregate Analysis with IDS
  • Types of IDS
  • Deployment of IDS
  • Types of Signatures
  • True/False-Positive/Negative
  • Major Methods of Operation
  • IDS Tool
  • Intrusion Prevention System
  • Information Flow in IDS and IPS
  • IPS Tool
  • IDS vs. IPS
  • Intrusion Detection Checklist


Module XII: Firewalls

  • Firewalls: Introduction
  • Security features
  • Multiple components of Firewall
  • Firewall Operations
  • Software Firewall
  • Hardware Firewall
  • Types of Firewalls
  • Pix Firewall
  • Basic features of PIX firewall
  • Advanced Features of PIX firewall
  • Firewall Features
  • Establishing Rules and Restrictions for your Firewall
  • Firewall Configuration Strategies
  • Scalability
  • Firewall Architecture
  • Handling threats and security tasks
  • Protection against hacking
  • Centralization and Documentation
  • Multi-layer firewall protection
  • Firewall deployment strategies
  • Specialty firewalls and Reverse firewalls
  • Advantages of using Firewalls
  • Disadvantages of using Firewalls
  • Threats
  • Limitations of Firewalls
  • Personal Firewall Software
  • Personal Firewall Hardware
  • Firewall Log Analysis
  • Firewall Tools
  • Comparison of Various Firewall Products
  • T-REX Open Source Firewall
  • SQUID
  • WinGate
  • Symantec Enterprise Firewall
  • Firewall Testers


Module XIII: Packet Filtering and Proxy Servers

  • Application layer gateway
  • Proxy servers


Module XIV: Bastion Host and Honeypots

  • Bastion Hosts
  • Honeypot
  • Honeynet


Module XV: Securing Modems

  • Introduction to Modems
  • Origin of Modems
  • Modem Features
  • Types of Modems
  • Modem Security
  • Categorizing Modem Access
  • Modem Attacks
  • Modem Risks
  • Modem Failure Symptoms
  • Troubleshooting Modems


Module XVI: Troubleshooting Network

  • Introduction to troubleshooting
  • A Troubleshooting Methodology
  • Troubleshooting Network devices
  • Troubleshooting Network Slowdowns
  • Troubleshooting Wireless devices
  • Troubleshooting Methodology
  • TCP/IP Troubleshooting Utilities


Module XVII: Hardening Routers

  • Introduction to Routers
  • Routing Metrics
  • Multiple Routing
  • Types of Routers
  • Routing Algorithms
  • Internet work Operating Systems (IOS)
  • IOS: FEATURES
  • Routing Principles
  • Modes Of Operation
  • IP Routing
  • IP Source Routing
  • Configuration of Routers
  • Router Configuration Modes
  • Finger Tool
  • Disabling the auxiliary and closing extra interfaces
  • BOOTp service
  • TCP and UDP small servers
  • Disabling Proxy ARP
  • Disabling SNMP
  • Disabling NTP
  • Hardening a Router
  • Cisco Discovery Protocol
  • Filtering Network Traffic
  • Access Control List
  • Log System Error Messages
  • Securing Routers: Committed Access Rate
  • Securing Routers: Secure Shell
  • Router Commands
  • Types of Routing
  • Routing Protocols
  • Routing Table Maintenance Protocol (RTMP)
  • Troubleshooting a router
  • Components of router security
  • Router security: testing tools


Module XVIII: Hardening Operating Systems

  • BIOS security
  • Windows Registry
  • Configuring Windows Services
  • Resource Access
  • Discretionary Access Control List (DACL)
  • Objects And Permissions
  • Rights Vs Permissions
  • NTFS File System Permissions
  • Encryption File System
  • Windows Network Security
  • Modes of Operation (Describes the security conditions under which the system actually functions)
  • AIS
  • Windows infrastructure features
  • Kerberos Authentication And Domain Security
  • Trust Relationships Between Domains
  • IP Security
  • Windows Security Tools
  • Windows
  • Windows Certificate Authorities
  • Certificate Authority Requirements
  • Desktop Management
  • File Management
  • Linux
  • Pluggable Authentication Module
  • Network Information Services
  • Group Management Utilities
  • Permission Management Tools
  • System Logger Utility
  • Unix Security
  • Macintosh Security
  • Vista security


Module XIX: Patch Management

  • Introduction
  • The Patch Concept
  • Patch testing
  • Patch Monitoring and Management
  • Consolidating Patches on Red hat Network
  • Red Hat Up2date Patch Management Utility Installation Steps
  • Red Hat Up2date Patch Management: Command Line Interface
  • Reporting
  • Patch Management Process
  • Windows Update Services
  • Microsoft Patch Management Tool: Microsoft Baseline Security Analyzer
  • Patch Management Tool


Module XX: Log Analysis

  • Introduction to Log Analysis
  • Overview of log analysis
  • Audit Events
  • Log Files
  • Limitations of log files
  • Monitoring for Intrusion and Security Event
  • Log Analysis Tools
  • How to Secure Logs(Log Security)
  • Inc setting up of Servers: IIS & Apache


Module XXI: Application Security

  • Importance of Application Security
  • Why Is Web Security So Difficult?
  • Application Threats and Counter Measures
  • Application dependent guidance
  • Web Applications
  • System Life Cycle Management
  • Telecommunications Systems
  • Securing voice communications
  • Securing data communications
  • Securing of keying material
  • Transmission security countermeasures (e.g., callsigns, frequency, and pattern forewarning protection)
  • Embedded Application Security (EMBASSY)
  • Secure Coding
  • Threat Modeling


Module XXII: Web Security

  • Overview of Web Security
  • Common Threats on Web
  • Identifying Unauthorized Devices
  • Restrictive Access
  • Network Addresses
  • Tracking the Connectivity: Tracert/Traceroute
  • Testing the Traffic Filtering Devices
  • IIS Server
  • Client Authorization
  • Client-Side Data
  • Server-side data
  • Client Authentication
  • Input Data Validation
  • Browsing Analysis
  • Browser Security
  • Plug-ins
  • Common Gateway Interface(CGI)


Module XXIII: E-mail Security

  • Overview of E-mail
  • History of E-mail
  • Basics of E-Mail
  • Types of E-Mail
  • Web Based Versus POP3 E-mail
  • Components of an Email
  • E-Mail Servers
  • E-Mail Encryption
  • Installing WorkgroupMail
  • Configuring Outlook Express
  • Secure Email
  • E-mail Authentication
  • E-mail protocols
  • Client and server architecture
  • E-Mail Security Risks
  • How to defend against E-Mail security risks
  • Tools for E-mail Security
  • Tracking e-mails


Module XXIV: Authentication: Encryption, Cryptography and Digital Signatures

  • Authentication
  • VeriSign Authentication
  • Encryption
  • Cryptography
  • Digital Certificates
  • Certificate Encryption Process
  • Public and Private Keys
  • Digital Signatures
  • Key Management Protocols (bundling, electronic key, over-the-air rekeying)


Module XXV: Virtual Private Networks and Remote Networking

  • Introduction to Virtual Private Network
  • Types of VPN
  • Tunneling
  • Fundamentals of Tunneling
  • Tunneling Protocol
  • Point to point Tunneling Protocol(PPTP)
  • Layer 2 Tunnel Protocol
  • VPN Security
  • Connection to VPN
  • VPN Policies
  • VPN Registrations And Passwords
  • Risk Associated With VPN
  • Pre Implementation Review – Auditing
  • Implementation Review – Auditing
  • Post Implementation Review And Reporting
  • VPN Product Testing
  • Common VPN Flaws


Module XXVI: Wireless Network Security

  • Introduction to Wireless
  • Types of Wireless Networks
  • Components of Wireless Network
  • Wireless Technologies
  • Wireless Communications: Examples
  • Devices using Wireless Communications
  • Service Set IDentifier (SSID)
  • Detecting Wireless Network
  • Types of Wireless Attacks
  • Wireless Threats
  • Overview of Wi-Fi
  • Open Wi-Fi Vulnerabilities
  • WLANs in Public Space
  • Wired Equivalent Privacy
  • WAP
  • Wireless Network Attack Tool: AirSnarf
  • Tools to detect MAC Address Spoofing: Wellenreiter v2
  • WLAN Management
  • Wireless Security
  • Wireless Auditing
  • DHCP Services
  • Mobile Security Through Certificates
  • Certificate Management Through PKI
  • Trouble Shooting Wireless Network
  • Wireless Network Security Checklist


Module XXVII: Creating Fault Tolerance

  • Network Security: Fault Tolerance
  • Why Create Fault Tolerance
  • Network Security
  • Reasons for Network Failure
  • Reasons For System Failure
  • Preventive Measures


Module XXVIII: Incident Response

  • What is an Incident
  • Category of Incident
  • Types of Incident
  • Step by Step Procedure
  • What Is an Incident Response
  • Six Step Approach for Incident Handling (PICERF Methodology)
  • Incident Response Team
  • Obstacles in Building a Successful Incident Response Team
  • Computer Security Incident Response Team


Module XXIX: Disaster Recovery and Planning

  • Overview of Disaster and its types
  • What is a Disaster Recovery
  • Principles of Disaster Recovery
  • Types of Disaster Recovery Systems
  • Backup Site
  • Recovery of Small and Large Computer Systems
  • Emergency Management
  • Disaster Recovery Planning
  • Security Planning
  • Process of Disaster Recovery Plan
  • Disaster Recovery Testing
  • Contingency Planning/Disaster Recovery
  • Contingency plan components, agency response procedures and continuity of operations
  • Team member responsibilities in responding to an emergency situation
  • Guidelines for determining critical and essential workload
  • Determination of backup requirements
  • Development of procedures for off-site processing
  • Development of plans for recovery actions after a disruptive event
  • Emergency destruction procedures
  • Disaster Recovery Planning Team
  • Business Process Inventory
  • Risk Analysis
  • Risk Management
  • Business Continuity Planning Process
  • Emergency destruction procedures
  • Six myths about Business Continuity Management and Disaster Recovery
  • Disaster Prevention


Module XXX: Network Vulnerability Assessment

  • Vulnerability Assessment
  • Features of a good vulnerability assessment
  • Vulnerability classes
  • Choice of Personnel for Network Vulnerability Assessment
  • Network vulnerability Assessment methodology:
  • How to assess vulnerability assessment tools
  • Selecting vulnerability assessment tools

What's included?
 

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers  & Onsite Certification Testing- (excluding 1-day Adobe, 1-day MS Office and PMP Boot Camps) 
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

Training Formats

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

Instructor Led (the best training format we offer)
Live Online Classroom – Online Instructor Led
Self-Paced Video

Speak to an Admissions Representative for complete details

By far the most competitve price we found, which included exam vouchers, hands on labs, practice test and a true Master of Cyber Security concepts as our Instructor. Franklin Mesa was the best trainer I have ever had and i walked out certified on the last day of my CompTIA Security+ certification bootcamp. 

Marc Alfonso - CompTIA Security + Student

 

The Academy is one of the best educational values for today's job market.  I studied hard and got certified (A+ and N+).  Even though I had no prior IT experience, I now have a good job replacing obsolete computers in hospitals throughout the country.  At my job interview, I just slid my test scores and certification across the table to the interviewer, who is now my boss.  I was hired the next day.  

Not bad for a 65 year old.

John Arnett- Student 

"I congratulate The Academy for a great facility and good lab computers. The Academy is great and I will definitely be taking more courses and utilizing the services available. Omer Palo is an excellent instructor that truly knows his material. I never felt bored in his class which is a first for me. Thank You."

IT Director, Burger King Corporation

"The instructor Frank Martinez is excellent – he covered so much material in 2 weeks that was unbelievable! He definitely knows what he does and it shows in the way that he conducts each lecture. He is the greatest!"
"Thanks Academy for allowing me to experience the MCSA / MCSE + Security Boot camp."

IT Professional, Florida International University

 

Schedules

Contact Us


THE ACADEMY

1.800.482.3172

FTL: 954.351.7040

MIA: 305.648.2000


Request More Information

 

Current Promotions!

 

  _____________________________________

 

 

 

Email Newsletter icon, E-mail Newsletter icon, Email List icon, E-mail List icon Sign up for our Email Newsletter!

          

 

Students - Orbund Log-In