IT security is becoming more and more important. Almost every week we are confronted with new attacks on IT systems. More and more companies are dependent on a safe and reliable IT infrastructure.
In this course the participant is familiarized with the security aspects of information technology. After visiting the course, they are able to use the IT infrastructure and especially the Internet more securely.
Network administrators, Security officers
Introduction into IT Security :
- Passive attacks
- Active attacks
- Dangers
- Masquerade
- Attacker
- Elementary safety requirements
Security Aspects of TCP/IP:
Threats using:
IP, ICMP, TCP, DNS, Telnet, FTP, SMTP, HTTP and SNMP
IP Addressing:
- Concept
- NAT (Network Address Translation)
- Private Addresses
Security Policy:
- Planning
- Implementation
Firewalls:
- What is a Firewall ?
- What does a firewall do ?
- Firewall limits
- Types of Firewalls
- Packet Filter
- Application-level Gateways / Proxy Services
- Statefull Inspection
- Standard Configuration
- "New Trends"
- Firewall management
Encryption:
- Symmetric Methods
(DES, Triple-DES, IDEA, Blowfish, RC4, RC5, AES,..)
- Asymmetric Methods
(Diffie-Hellman, RSA)
- Key Exchange
Hash Methods:
- MD4 and MD5
- SHA and HMAC
Public Key Infrastructure:
- Conzept, Elements, X.509 Certificates
IPSec:
- Transport- and Tunnelmodus
- Security Association
- AH- and ESP-Header
Authentication:
- Passwwords
- S/Key
- PAP
- CHAP
- RADIUS
- TACACS/TACACS+
Virtual Private Networks:
- Introduction
- VPN Types
- VPN Elements
- Standards
- Implementation steps
Secure Electronic Mail
- Problems
- Solutions
- S/MIME
- PGP
Secure Web
- Client Security
- Server Security
- SSL (Secure Socket Layer)
Security Audit
Participation in the "TCP/IP Protocols" course or equivalent knowledge
3 days
The course is carried out as a combination of presentation and workshop. The individual modules are initiated by an introductory presentation. They are then extended by a various "live" demonstrations / exercises.
All participating PCs have an Internet connection, SW analyser, port scanner,...
The participants receive comprehensive documentation. The course documentation contains copies of all documents shown in the course. The course fees include this documentation, as well as refreshment during intervals and lunch.
The course can also be carried out on the premises of your company.
Please contact us for more information!
|