Network Security Fundamentals

decisioncrunchNetworking and Communications

Nov 20, 2013 (4 years and 7 months ago)




#EKT085540 Rev.
November, 13

ExecuTrain Course Outline

Network Security Fundamentals


5 Days

Course Description


Network Security Fundamentals is designed to provide both Windows NT and Unix network administrators an
awareness of security related issues and t
he essential skills they need to implement security in such networks.This course is
the first course offered in Level 1 of the Security Certified Program. For more information on the Security Certified Program
please see below.


To ensure y
our success, we recommend you first take the following course or have equivalent knowledge:

CompTIA Network+

Delivery Method:

led, group
paced, classroom
delivery learning model with structured hands
on activities.

Target Student:

Students i
nterested in obtaining a better understanding of the basics of network security within the
Information Technology field. Students enrolling in this course should have a firm knowledge of the Network OSI model,
networking technologies as well as a good unde
rstanding of TCP/IP.

What's Next?:

This is one of the courses in the Security Certified Certification Program. This certification contains two
different levels and has two courses within each level. This specific course is the first course of the first le
vel. The first level
of this certification is targeted towards students who want to broaden their knowledge of the network security field, and the

second level is targeted towards individuals who want to specialize in the network security field. For more i
nformation on the
Security Certified program, please visit:

Hardware/Software Requirements:

You will need:

The course setup details are located in Appendix A.


Lesson objectives help students become comfortable with the course, and also provide a means to evaluate
learning. Upon successful completion of this course, students will be able to:

Identify the basics of network security.

Define the TCP/IP l
ayered architectures and review advanced IP addressing protocols and commands.

Describe and work with IP protocols and packets at various levels.

Create router security using the functions of Access Control Lists.

Secure Windows NT and 2000 computers an
d test security effectiveness.

Secure Linux computers and tests security effectiveness.

Define the common Internet components and examine techniques used in Web hacking.

Examine and work with the common techniques used to attack networks.

Examine and w
ork with the specific tools used to attack Windows 9x/NT/2000 and Linux.



#EKT085540 Rev.
November, 13

Course Content

Lesson 1: Foundations of Network Security

Topic 1A: The Principles of Network Security

Topic 1B: Network Security Terminologies

Topic 1C: Network Security and Data Av

Topic 1D: Components of Network Security

Topic 1E: Network Security Policies

Lesson 2: Advanced TCP/IP

Topic 2A: The Concepts of TCP/IP

Topic 2B: Subnet Masks

Topic 2C: Variable Length Subnet Masks (VLSM)

Topic 2D: Unicast, Broadcast, and Multi
cast Concepts

Topic 2E: The 3
Way Handshake

Topic 2F: The Process of DHCP and APIPA

Lesson 3: IP Packet Structure and Analysis

Topic 3A: Capture and Identify IP Datagrams

Topic 3B: Capture and Identify ICMP Messages

Topic 3C: Capture and Identify TCP Head

Topic 3D: Capture and Identify UDP Headers

Topic 3E: Packet Fragmentation

Topic 3F: The 3
Way Handshake

Lesson 4: Routing and Access Control Lists

Topic 4A: Describe the Arp Process

Topic 4B: View the CISCO Routing Modes

Topic 4C: Describe the Routin
g Process

Topic 4D: Static Routing Tables

Topic 4E: Access Control Lists

Topic 4F: Implement Access Control Lists

Lesson 5: Securing Windows Computers

Topic 5A: Describe Windows Security Features

Topic 5B: Secure Files on Multiple Partitions

Topic 5C: Cr
eate Strong Passwords

Topic 5D: Secure Registry Information

Topic 5E: Audit Critical Files

Topic 5F: Implement User Rights

Topic 5G: Create Group Policies

Topic 5H: Implement a ‘securedc’ Configuration

Topic 5I: Implement the Encrypted File System (EF

Topic 5J: Securing Services

Topic 5K: Internet Information Services

Lesson 6: Securing Linux Computers

Topic 6A: Key Linux Concepts

Topic 6B: Linux Administration and Security

Topic 6C: Key Linux Network Files

Topic 6D: Key Linux Network Processes

c 6E: Key Linux Network Commands

Topic 6F: Hardening Linux

Topic 6G: Portmap and Linux

Topic 6H: Network File System (NFS) and Linux

Topic 6I: Network Information Service (NIS) and Linux



#EKT085540 Rev.
November, 13

Lesson 7: Security on the Internet and the WWW

Topic 7A: Components
of the Internet

Topic 7B: The Weak Points of the Internet

Topic 7C: The Techniques of Web Hacking

Topic 7D: Methods of Attacking Users

Lesson 8: Attack Techniques

Topic 8A: Network Reconnaissance

Topic 8B: Mapping the Network

Topic 8C: Sweeping the Networ

Topic 8D: Scanning the Network

Topic 8E: Viruses, Worms, and Trojan Horses

Topic 8F: Social Engineering

Topic 8G: Basic Programming Techniques

Topic 8H: Case Study: Social Engineering

Lesson 9: Attacking Operating Systems

Topic 9A: Scanning the Network
for Vulnerabilities

Topic 9B: Attack with a Trojan Horse

Topic 9C: Record Keystrokes

Topic 9D: Crack Encrypted Passwords

Topic 9E: Reveal Hidden Passwords

Topic 9F: Perform a Denial of Service

Topic 9G: Gain Unauthorized Access

Topic 9H: Hide Evidence of
an Attack

Topic 9I: Gaining Control over the System

Appendix A: Equipment and Software List, Class Setup and Layout

Classroom Requirements

Student PC Setup

Hard Disk Partitioning Scheme

Ghosting of drives


Recommended Classroom Layout and Configuratio