ENSA: Certified Network Security Administrator Boot Camp

Description

Duration: 5 days

This five-day course looks at network security in a defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network and to develop security policies that will protect an organization’s information.

Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them.

The EC-Council’s NSA certification looks at the network security in a defensive view while the CEH certification program looks at the security in offensive mode. The NSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network and to develop security policies that will protect an organization’s information.

Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies.

In addition, they will learn how to expose system and network vulnerabilities and defend against them.

This course prepares students for EC-Council Exam 312-38 ENSA.

Prerequisites

Who should attend:

  • System administrators
  • Network administrators
  • Anyone who is interested in network security technologies
  • Those who plan to take the CEH course but lack the requisite experience

What’s included?

  • Authorized Courseware
  • Intensive Hands on Skills Development with an Experienced Subject Matter Expert
  • Hands-on practice on real Servers and extended lab support 1.800.482.3172
  • Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
  • Academy Code of Honor: Test Pass Guarantee
  • Optional: Package for Hotel Accommodations, Lunch and Transportation

With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.

Methods

  • Instructor Led (the best training format we offer)
  • Live Online Classroom – Online Instructor Led
  • Self-Paced Video

Speak to an Admissions Representative for complete details

StartFinishPublic PricePublic Enroll Private PricePrivate Enroll
12/25/202312/29/2023
1/15/20241/19/2024
2/5/20242/9/2024
2/26/20243/1/2024
3/18/20243/22/2024
4/8/20244/12/2024
4/29/20245/3/2024
5/20/20245/24/2024
6/10/20246/14/2024
7/1/20247/5/2024
7/22/20247/26/2024
8/12/20248/16/2024
9/2/20249/6/2024
9/23/20249/27/2024
10/14/202410/18/2024
11/4/202411/8/2024
11/25/202411/29/2024
12/16/202412/20/2024
1/6/20251/10/2025

Curriculum

Module I: Fundamentals of Computer Network

Key elements of network
Logical Elements of Network
Types of network media
Media Access Methods
Critical information characteristics
Information states
Operations Security (OPSEC)
Object reuse(computer security)
OSI Model
Transmission Modes
Types of Transmission
Logical Network Classification
Network Topologies
Physical Network Classification
Network Equipments

Module II: Network Protocols

Introduction to protocols
Implementing Network protocols
Application Layer Protocols
Presentation Layer Protocol
Session Layer Protocol
Transport Layer Protocols
Network Layer Protocols
Data link Layer Protocol

Module III: Protocol Analysis

Overview of tcp/ip
Relation to other Protocol
TCP/IP Protocol suite
Windowing
Sliding Window
Acknowledgement
TCP
IP

Module IV: Hardening Physical Security

Need for physical security
Security Statistics
Physical Security Breach Incidents
Factors Affecting Physical Security
Physical Security Threats
Premises Security
EPS (Electronic Physical Security)
Challenges in Ensuring Physical Security
Mantrap
Physical Security Checklist

Module V: Network Security

Overview of Network Security
The need for network security
The goals of network security
Security awareness
Functions of Network security administrator
Communication Security (COMSEC)
Functions of INFOSEC Officer
Functions of information resources management staff
Program or functional managers
Security office
Senior management
System manager and system staff
Telecommunications office and staff
Functions of audit office
Functions of OPSEC managers
Role of end users
Network Security at:
Transmission Security
Legal Elements
Countermeasures: cover and deception
Reporting security violations

Module VI: Security Standards Organizations

Internet Corporation for Assigned Names and Numbers (ICANN)
International Organization for Standardization (ISO)
Consultative Committee For Telephone and Telegraphy (CCITT)
International Telecommunication Union (ITU)
American National Standards Institute(ANSI)
Institute Of Electronics and Electrical Engineers(IEEE)
Electronic Industries Association
National Center for Standards and Certification Information (NIST)
World Wide Web Consortium (W3C)
Web Application Security Consortium (WASC)

Module VII: Security Standards

Introduction to Internet Standards
Standards Creation Committee
Internet Standards
Cabling Standards
Specification Standards

Module VIII: Security Policy

Security Policy overview
Concept of Security Policy
Key Security Elements
Security Awareness Programs
Vital role of a security policy
Classification of Security policy
Contents of Security Policy
Privacy and Confidentiality
Security levels
Agency Specific AIS and Telecommunications Policies
Configuration of security policy
National Policy and Guidance
Implementation of security policy
Incident Handling and Escalation Procedures
Security operations and life cycle management
Defining Responses to Security Violations
Presenting and Reviewing the Process
Compliance with Law and Policy
Transborder encryption issues
Points To Remember While Writing Security Policy
Issue-specific Security Policy (ISSP)
Creating and Managing ISSPs

Module IX: IEEE Standards

Introduction to IEEE standards
IEEE LAN Protocol Specification
Wireless Networking Standards

Module X: Network Security Threats

Current Statistics
Types of Attackers
Classification of Hackers
Techniques
Common Vulnerabilities and Exposures (CVE)
Attacks
Hiding Evidence of an Attack
Problems Detecting Network Attacks
Network Scanning Tools

Module XI: Intrusion Detection System (IDS) and Intrusion Prevention Systems (IPS)

Introduction to IDS
History of Intrusion Detection
Intrusion Detection Concepts
IDS for an Organization
Characteristics of IDS
Aggregate Analysis with IDS
Types of IDS
Deployment of IDS
Types of Signatures
True/False-Positive/Negative
Major Methods of Operation
IDS Tool
Intrusion Prevention System
Information Flow in IDS and IPS
IPS Tool
IDS vs. IPS
Intrusion Detection Checklist

Module XII: Firewalls

Firewalls: Introduction
Security features
Multiple components of Firewall
Firewall Operations
Software Firewall
Hardware Firewall
Types of Firewalls
Pix Firewall
Basic features of PIX firewall
Advanced Features of PIX firewall
Firewall Features
Establishing Rules and Restrictions for your Firewall
Firewall Configuration Strategies
Scalability
Firewall Architecture
Handling threats and security tasks
Protection against hacking
Centralization and Documentation
Multi-layer firewall protection
Firewall deployment strategies
Specialty firewalls and Reverse firewalls
Advantages of using Firewalls
Disadvantages of using Firewalls
Threats
Limitations of Firewalls
Personal Firewall Software
Personal Firewall Hardware
Firewall Log Analysis
Firewall Tools
Comparison of Various Firewall Products
T-REX Open Source Firewall
SQUID
WinGate
Symantec Enterprise Firewall
Firewall Testers

Module XIII: Packet Filtering and Proxy Servers

Application layer gateway
Proxy servers

Module XIV: Bastion Host and Honeypots

Bastion Hosts
Honeypot
Honeynet

Module XV: Securing Modems

Introduction to Modems
Origin of Modems
Modem Features
Types of Modems
Modem Security
Categorizing Modem Access
Modem Attacks
Modem Risks
Modem Failure Symptoms
Troubleshooting Modems

Module XVI: Troubleshooting Network

Introduction to troubleshooting
A Troubleshooting Methodology
Troubleshooting Network devices
Troubleshooting Network Slowdowns
Troubleshooting Wireless devices
Troubleshooting Methodology
TCP/IP Troubleshooting Utilities

Module XVII: Hardening Routers

Introduction to Routers
Routing Metrics
Multiple Routing
Types of Routers
Routing Algorithms
Internet work Operating Systems (IOS)
IOS: FEATURES
Routing Principles
Modes Of Operation
IP Routing
IP Source Routing
Configuration of Routers
Router Configuration Modes
Finger Tool
Disabling the auxiliary and closing extra interfaces
BOOTp service
TCP and UDP small servers
Disabling Proxy ARP
Disabling SNMP
Disabling NTP
Hardening a Router
Cisco Discovery Protocol
Filtering Network Traffic
Access Control List
Log System Error Messages
Securing Routers: Committed Access Rate
Securing Routers: Secure Shell
Router Commands
Types of Routing
Routing Protocols
Routing Table Maintenance Protocol (RTMP)
Troubleshooting a router
Components of router security
Router security: testing tools

Module XVIII: Hardening Operating Systems

BIOS security
Windows Registry
Configuring Windows Services
Resource Access
Discretionary Access Control List (DACL)
Objects And Permissions
Rights Vs Permissions
NTFS File System Permissions
Encryption File System
Windows Network Security
Modes of Operation (Describes the security conditions under which the system actually functions)
AIS
Windows infrastructure features
Kerberos Authentication And Domain Security
Trust Relationships Between Domains
IP Security
Windows Security Tools
Windows
Windows Certificate Authorities
Certificate Authority Requirements
Desktop Management
File Management
Linux
Pluggable Authentication Module
Network Information Services
Group Management Utilities
Permission Management Tools
System Logger Utility
Unix Security
Macintosh Security
Vista security

Module XIX: Patch Management

Introduction
The Patch Concept
Patch testing
Patch Monitoring and Management
Consolidating Patches on Red hat Network
Red Hat Up2date Patch Management Utility Installation Steps
Red Hat Up2date Patch Management: Command Line Interface
Reporting
Patch Management Process
Windows Update Services
Microsoft Patch Management Tool: Microsoft Baseline Security Analyzer
Patch Management Tool

Module XX: Log Analysis

Introduction to Log Analysis
Overview of log analysis
Audit Events
Log Files
Limitations of log files
Monitoring for Intrusion and Security Event
Log Analysis Tools
How to Secure Logs(Log Security)
Inc setting up of Servers: IIS & Apache

Module XXI: Application Security

Importance of Application Security
Why Is Web Security So Difficult?
Application Threats and Counter Measures
Application dependent guidance
Web Applications
System Life Cycle Management
Telecommunications Systems
Securing voice communications
Securing data communications
Securing of keying material
Transmission security countermeasures (e.g., callsigns, frequency, and pattern forewarning protection)
Embedded Application Security (EMBASSY)
Secure Coding
Threat Modeling

Module XXII: Web Security

Overview of Web Security
Common Threats on Web
Identifying Unauthorized Devices
Restrictive Access
Network Addresses
Tracking the Connectivity: Tracert/Traceroute
Testing Traffic Filtering Devices
IIS Server
Client Authorization
Client-Side Data
Server-side data
Client Authentication
Input Data Validation
Browsing Analysis
Browser Security
Plug-ins
Common Gateway Interface(CGI)

Module XXIII: E-mail Security

Overview of E-mail
History of E-mail
Basics of E-Mail
Types of E-Mail
Web-Based Versus POP3 E-mail
Components of an Email
E-Mail Servers
E-Mail Encryption
Installing WorkgroupMail
Configuring Outlook Express
Secure Email
E-mail Authentication
E-mail protocols
Client and server architecture
E-Mail Security Risks
How to defend against E-Mail security risks
Tools for E-mail Security
Tracking e-mails

Module XXIV: Authentication: Encryption, Cryptography, and Digital Signatures

Authentication
VeriSign Authentication
Encryption
Cryptography
Digital Certificates
Certificate Encryption Process
Public and Private Keys
Digital Signatures
Key Management Protocols (bundling, electronic key, over-the-air rekeying)

Module XXV: Virtual Private Networks and Remote Networking

Introduction to Virtual Private Network
Types of VPN
Tunneling
Fundamentals of Tunneling
Tunneling Protocol
Point to Point Tunneling Protocol(PPTP)
Layer 2 Tunnel Protocol
VPN Security
Connection to VPN
VPN Policies
VPN Registrations And Passwords
Risk Associated With VPN
Pre Implementation Review – Auditing
Implementation Review – Auditing
Post Implementation Review And Reporting
VPN Product Testing
Common VPN Flaws

Module XXVI: Wireless Network Security

Introduction to Wireless
Types of Wireless Networks
Components of Wireless Network
Wireless Technologies
Wireless Communications: Examples
Devices using Wireless Communications
Service Set Identifier (SSID)
Detecting Wireless Network
Types of Wireless Attacks
Wireless Threats
Overview of Wi-Fi
Open Wi-Fi Vulnerabilities
WLANs in Public Space
Wired Equivalent Privacy
WAP
Wireless Network Attack Tool: AirSnarf
Tools to detect MAC Address Spoofing: Wellenreiter v2
WLAN Management
Wireless Security
Wireless Auditing
DHCP Services
Mobile Security Through Certificates
Certificate Management Through PKI
Trouble Shooting Wireless Network
Wireless Network Security Checklist

Module XXVII: Creating Fault Tolerance

Network Security: Fault Tolerance
Why Create Fault Tolerance
Network Security
Reasons for Network Failure
Reasons For System Failure
Preventive Measures

Module XXVIII: Incident Response

What is an Incident
Category of Incident
Types of Incident
Step by Step Procedure
What Is an Incident Response
Six-Step Approach for Incident Handling (PICERF Methodology)
Incident Response Team
Obstacles in Building a Successful Incident Response Team
Computer Security Incident Response Team

Module XXIX: Disaster Recovery and Planning

Overview of Disaster and its types
What is a Disaster Recovery
Principles of Disaster Recovery
Types of Disaster Recovery Systems
Backup Site
Recovery of Small and Large Computer Systems
Emergency Management
Disaster Recovery Planning
Security Planning
Process of Disaster Recovery Plan
Disaster Recovery Testing
Contingency Planning/Disaster Recovery
Contingency plan components, agency response procedures and continuity of operations
Team member responsibilities in responding to an emergency situation
Guidelines for determining critical and essential workload
Determination of backup requirements
Development of procedures for off-site processing
Development of plans for recovery actions after a disruptive event
Emergency destruction procedures
Disaster Recovery Planning Team
Business Process Inventory
Risk Analysis
Risk Management
Business Continuity Planning Process
Emergency destruction procedures
Six myths about Business Continuity Management and Disaster Recovery
Disaster Prevention

Module XXX: Network Vulnerability Assessment

Vulnerability Assessment
Features of a good vulnerability assessment
Vulnerability classes
Choice of Personnel for Network Vulnerability Assessment
Network Vulnerability Assessment methodology:
How to assess vulnerability assessment tools
Selecting vulnerability assessment tools