Information Security Training
Course 468
4 DAY COURSE

Course Outline

In this Information Security Training course, you will gain the foundational knowledge and skills to analyze and assess network risks and then select and deploy appropriate countermeasures.

Information Security Training Benefits

  • Through multiple hands-on exercises, you will:

    • Evaluate methods for strong authentication.
    • Search for possible vulnerabilities in operating systems.
    •  Reduce your organization’s exposure to dangers in enterprise-wide and virtual private networks (VPNs).
    • Analyze your exposure to security threats.
    • Protect your organization's systems and data.
    • Deploy firewalls and data encryption to minimize threats.
    • Assess alternative user and host authentication mechanisms.
    • Manage risks originating from inside the organization and from the internet.
    • Leverage continued support with after-course one-on-one instructor coaching and computing sandbox.
  • Prerequisites

    None.

Information Security Training Outline

Module 1: Building A Secure Organization

Real threats that impact cybersecurity 

  • Hackers, internal and external
  • Eavesdropping
  • Spoofing
  • Sniffing
  • Trojan horses
  • Viruses
  • Wiretaps

A cyber security policy: the foundation of your protection

  • Defining your information assurance objectives
  • Assessing your exposure

Module 2: A Cryptography Primer

Securing data with symmetric encryption

  • Choosing your algorithm: DES, AES, Rc4, and others
  • Assessing key length and key distribution

Solving key distribution issues with asymmetric encryption

  • Generating keys
  • Encrypting with RSA
  • Explore PGP and GnuPG
  • Evaluating Web of Trust and PKI

Ensuring integrity with hashes

  • Hashing with Md5 and SHA
  • Protecting data in transit
  • Building the digital signature

Module 3: Verifying User and Host Identity

Assessing traditional static password schemes

  • Creating a strong password policy to prevent password guessing and cracking
  • Protecting against social engineering attacks
  • Encrypting passwords to mitigate the impact of password sniffing

Evaluating strong authentication methods

  • Preventing password replay using one-time and tokenized passwords
  • Employing biometrics as part of multi-factor authentication

Authenticating hosts

  • Distrusting IP (Internet Protocol) addresses
  • Mitigating address-spoofing issues and implementing countermeasures
  • Implementing solutions for wireless networks

Module 4: Preventing System Intrusions

Discovering system vulnerabilities

  • Searching for operating system vulnerabilities
  • Discovering file permission issues
  • Limiting access via physical security

Encrypting files for confidentiality

  • Encrypting with application-specific tools
  • Recovering encrypted data

Hardening the operating system

  • Locking down user accounts
  • Securing administrator's permissions
  • Protecting against viruses

Module 5: Guarding Against Network Intrusions

Scanning for vulnerabilities

  • Searching for rogue servers
  • Profiling systems and services

Reducing Denial of Service (DoS) attacks

  • Securing DNS (Domain Name System)
  • Limiting the impact of common attacks

Deploying firewalls to control network traffic

  • Preventing intrusions with filters
  • Implementing a cyber security policy
  • Deploying personal firewalls

Protecting web services and applications

  • Validating user input
  • Controlling information leakage

Module 6: Ensuring Network Confidentiality

Threats from the LAN

  • Sniffing the network
  • Mitigating threats from connected hosts
  • Partitioning the network to prevent data leakage
  • Identifying wireless LAN vulnerabilities

Confidentiality on external connections

  • Ensuring confidentiality with encryption
  • Securing communication with IPsec
Course Dates
Attendance Method
Note about the Certification Exam

The exam is not included in the tuition. DIR will cover the cost if you choose to take the exam. When you register for the course, you will be prompted to choose Y/N to take the exam. Please be advised that if you do choose to take the exam, the Certification Organization has agreed to provide DIR the pass/fail status of your exam. DIR will only share this information in an aggregated report to state leadership that reflects total exam pass or fails. No individual names of any students will be included in any reports.

If you wish to pursue certification, DIR requires that you submit the request within one month of the last day of your course to request your exam voucher. DIR requires that you take your exam within six months of the last day of your course.

Additional comments or questions (optional)

Private Team Training

Interested in courses outside the scope of the DIR InfoSec Academy? Your organization has the option to purchase additional courses for your team through our DIR IT training contract DIR-TSO-4006