Package Includes:
  • 7 Sessions featuring live instructor-led classroom sessions with full audio, video and demonstration components
  • Printable courseware
  • Exclusive LearningZone 7x24 Live Mentor Click for More Details
    Help Whenever you need it! Exclusive LearningZone - Chat Live with our Certified Instructors anytime around the clock (7x24)
  • Focused on practical solutions to real-world development problems
  • 1 Microsoft Authorized MeasureUp Exam Simulations
  • Proven technique- Actual Exam Secrets Review
  • Certification Exam Pass Guarantee
  • Free 1 Year Upgrade Policy
OURexpertText
Bill Hatfield

Kenneth Mayer - Certified CEH Trainer (CCSI, MCT, CCNP, CCDA)
Ken Mayer is a Microsoft Certified Trainer as well as a Certified Ethical Hacker Trainer and Security consultant. He started his career in computer technology in 1980s. He has offered a wide variety of IT training and high level consulting projects for Fortune 500 companies across the United States and Western Europe. He has achieved the Certified Cisco Systems Instructor certification. The CCSI certification involved a two-day lab and observation event held on Cisco in Paris, France Facility. This gave Ken the accreditation to be able to deliver Cisco Authorized Courses as a CCSI. He has taught the full line of Cisco CCNA, CCDA, CCNP, CCDP and CCIP course curriculums, including Cisco's security appliances such as PIX and IDS.

Course Features:
Course Outline TXT
Level 1 - General Security Concepts
Goals of a Secure Network
Access Control
Bell-LaPadula Model
Lattice-Based Models
Discretionary Access Control
Demo - Discretionary Access Control List
Role-Based Access Control
Authentication
Kerberos
CHAP
Demo - CHAP Settings
Certificates
Username/Password
Demo - Password Policies
Tokens
Mutual Authentication
Biometrics
Auditing
AAA Examples
Demo - Auditing
Disabling Non-Essential Services
Disabling Non-Essential Protocols
Disabling Non-Essential Systems
Disabling Non-Essential Processes
Demo - Disabling Non-Essential Services
Network Attacks
Sniffing
Demo - Vulnerability Scans
Denial of Service (DoS)
SYN Attacks
Demo - DoS Attacks
Back Door
Spoofing
Demo - Man in the Middle Attack
Replay Attacks
TCP/IP Hijacking
Weak Keys
Social Engineering
Birthday Attack
Password Guessing
Demo - Brute Force Password Attack
Software Exploitation
Buffer Overflows
Malicious Code
Logic Bombs
Demo - Buffer Overflow
Level 1 Review
Level 2 - Communication Security
Remote Access
EAP
Virtual Private Netwrok (VPN)
RADIUS
PPTP
SSH (Secure Shell)
IPSec
Demo - IPSec
Remote Access Vulnerabilities
E-mail
Demo - PGP Keys
E-mail Vulnerabilities
Spam
Web Security
Secure Sockets Layer (SSL)
Transport Layer Security (TLS)
Demo - HTTPS
Instant Messaging
Web Vulnerabilities
Demo - Security Settings in IE
Web Vulnerabilities Cont.
Directory Services
SSL/TLS
File Transfer Protocol (FTP)
Wireless Communications
802.11x
WEP
Wireless Vulnerabilities
Level 2 Review
Level 3 - Infrastructure
Firewalls
Application Level Firewalls
Network Level Firewalls
Routers
Switches
Wireless
Modems
RAS
Demo - Routing and Remote Access Services
Telecom/PBX
IDS
Network Monitoring/Diagnostics
Workstations
Servers
Coax
UTP/STP
Fiber
Removable Media
Tape
CDR
Hard Drives
Diskettes
Flashcards
Security Zones
VLANS
Network Address Translation (NAT)
Tunneling
Network Based IDS
Active Detection
Incident Response
Demo - Server Hardening
Network Hardening
Application Hardening
Demo - SQL Injection
Level 3 Review
Level 4 - Basics of Cryptography
Algorithms
Symmetric
CIA
Digital Signatures
Demo - Using Keys
Non-Repudiation
Certificates
Demo - Examples of Certificates
Certificate Contents
Revocation
Trust Models
Demo - Certificate Services
Standards and Protocols
Key/Certificate Management
Expiration
Key Usage
Level 4 Review
Level 5 - Physical Security
Access Control
Physical Barriers
Social Engineering
Wireless Threats
Disaster Recovery
Backups
Demo - Backups
Tape Rotation & Testing
Off-Site Storage
Disaster Recovery Plan
Business Continuity
Utilities
Security Policy
Privacy
Separation of Duties
Service Level Agreements
HR Policy
Forensics
Chain of Custody
Risk Identification
Risk Assessment
Vulnerabilities
Education - Users, HR, Execs
Communication
Education
Documentation
Systems Architecture
Change Documentation
Logs and Inventories
Classification
Level 5 Review
Level 6 - Implementing Web Security
Securing the Web Client
Demo - Securing the Web Client
Configuring OS and Network Security
Enhancing Web Server Security
Issuing and Managing Certificates
Demo - Certificate Requests
Protecting Networks with Firewalls
Security Management
Level 6 Review
Level 7 - PKI in the Enterprise
Trust in a Digital World
Foundations of Cryptography
PKI Components
Level 7 Review
Course Closure