Auditing Network Security
During the 3 day Auditing Network Security course, participants will learn how to audit the key systems identified on a network. Networks need to be fortified to defend against threats such as APTs. Students will learn how to audit key network components including routers, switches, firewalls, IDS/IPS and wireless networks. Students will also look at the risks to a network when introducing cloud computing solutions. Host based protections including endpoint protection, advanced malware protection, application whitelisting, data loss prevention and vulnerability scanning will also be investigated. The tools and techniques to audit such systems are discussed and utilized during hands-on exercises.
CPE:
21
Program Level:
Intermediate
Delivery Method:
Live
Cost :
$990 for this live 3 day course

Course Contents/Objectives
I. Foundational Skills
• Background
• Protocols and IPv6 considerations
• Identifying the environment
• Creating inventories
• Network maps and diagrams
II. Threat Vectors
• What makes a system vulnerable
• Risks posed to your security devices
• Minimizing the impact of a compromise
• Defending against APTs
• Understanding the APT life cycle
• Defending against DOS attacks
III. Routers
• Key areas that should be secured
• Tools to review router security issues
IV. Switches
• VLANs, NAC/NAP
• Layer 2 security risks
• Tools to review switch security issues
V. Firewalls
• Static filtering, stateful filtering, stateful inspection, NAT
• Key rulebase concepts
• Additional Tools for Technical Validation
• NextGen Firewalls
• Proxies
• Application Level Firewalls
VI. IDS/IPS
• Host versus network
VII. Host Security
• Endpoint Protection
• Advanced Malware Protection
• Application Whitelisting
• Data Loss Prevention
VIII. Where and when to deploy each
• Tools for assessing security
IX. Cloud Computing
• Risks
• Audit questions and considerations
X. Wireless
• Wireless security risks
• Tools for assessing wireless security
XI. Vulnerability assessments
XII. Logging and SIEM
Laptop Required
Students are required to have a laptop in order to complete the hands-on exercises. The laptop should meet the following specifications for the student to get the most from the exercises:
• 16 GB RAM or higher
• 25 GB available hard drive space
• Windows 10 professional or later (Home or similar editions will not have some of the features needed.)
• Administrator privileges including the capability to install and run tools, as well as disable anti-virus
• VMWare Player should be installed
Target Audience
• Internal Auditors
• IT Specialist Auditors
• IT Auditors
• IT Audit Managers
• Information System Auditors
• Information Technology Auditors
• Information Security Officers
Prerequisites
Participants should be familiar with Internet technologies and commonly used Internet security controls. No other advance preparation is required.
What People Say About Us

Chris

Dottie

Justin
