Ons Benelux trainingscentrum is  weer geopend. Boost jouw skills en train versneld & voordelig met onze zomeractie en ontvang een korting tot 25% tijdens de maanden juni, juli en augustus.

EC-Council - CAST - Advanced Network Defense

Looptijd

Looptijd:

Slechts 3 dagen

Methode

Methode:

Klas / Online / Hybride

Volgende datum

Volgende datum:

28/9/2020 (Maandag)

Overview

The EC-Council Centre of Advanced Security Training has arrived at Firebrand Training. This three-day Advanced Network Defense course is intensive, and will make you think like a hacker. You will learn how to defend against the latest attacks.

Warning: This is not a beginner’s course. You'll be expected to know how to attempt attacks against many platforms and architectures. The instructor will challenge you to attack a device or system, then you will learn how to defend against it. The course is right for you if you're a: firewall administrator, system architect, or system / Windows administrator.

You will learn:

  • How to identify security weaknesses in computer systems or networks, before it's too late
  • How to use hacking and pen testing to defend against various attacks
  • Best practices in developing secure system and network configurations
  • How to deploy machines in a protected state
  • Techniques critical to the protection of your entire enterprise against some of today’s most advanced threats
  • How to detect malware

Note: this course doesn't include an exam, but you'll become Advanced Network Defense certified.

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Zeven redenen waarom jij voor jouw CAST AND cursus voor Firebrand kiest:

  1. Jij zal in slechts 3 dagen CAST AND gecertificeerd zijn. Doordat onze cursussen residentieel zijn kunnen wij langere lesdagen aanbieden en zal je tijdens je verblijf volledig gefocust zijn op jouw cursus
  2. Onze CAST AND cursus is all-inclusive. Cursusmaterialen, examens, accommodatie en maaltijden zijn inbegrepen.
  3. Slaag de eerste keer voor CAST AND of train gratis opnieuw. Vraag naar de voorwaarden van onze certificeringsgarantie bij onze Education Consultants.
  4. Je zal meer over CAST AND leren. Waar opleidingen elders doorgaans van 9:00 tot 17:00 duren, kan je bij Firebrand Training rekenen op 12 uur training per dag!

  5. Je zal CAST AND sneller beheersen. Doordat onze cursussen residentieel zijn word je in korte tijd ondergedompeld in de theorie. Hierdoor zal je volledig gefocust zijn op de cursus en zal je sneller de theorie en praktijk beheersen.
  6. Je zal voor CAST AND studeren bij de beste training provider. Firebrand heeft het Q-For kwaliteitlabel, waarmee onze standaarden en professionaliteit op het gebied van training erkend worden. We hebben inmiddels 76283 professionals getraind en gecertificeerd!
  7. Je gaat meer doen dan alleen de cursusstof van CAST AND bestuderen. We maken gebruik van laboratoria, case-studies en oefentests, om ervoor te zorgen dat jij jouw nieuwe kennis direct in jouw werkomgeving kan toepassen.

Benefits

Curriculum

Module 1: Firewalls

  • Firewalls
  • Firewall Types: Stateless Packet Filters
  • Improving Device Remote-Access Security
  • Locking Down the Console Port
  • Protecting Terminal Lines
  • Establishing Encrypted Communications
  • Configuring HTTPS
  • Configuring SSH

LAB: Securing the Perimeter

Module 2: Advanced Filtering

  • Advanced Filtering Techniques
  • Ingress Filtering
  • Egress Filtering
  • Source Address Verification (SAV)
  • uRPF
  • Additional Filtering Considerations
  • Time-Based ACLs
  • Reflexive ACLs
  • Reflexive ACL vs. Static ACL
  • Context-Based Access Control (CBAC)
  • Essential Steps to Harden Routers

LAB: Advanced Filtering

Module 3: Firewall Configuration

  • Firewall Types: Stateful Packet Filters
  • Application Proxies
  • Application Proxies vs. Stateful Packet filters
  • Web Application Firewalls
  • Web Application Firewall Types
  • Web Application Firewall Products
  • Firewall Architecture
  • Screened Subnet Firewall
  • The Classic Firewall Architecture
  • Belt and Braces Firewall
  • Separate Services Subnet
  • Fortress Mentality
  • De-parameterization
  • Perimeter Configuration

LAB: Selecting a Firewall Architecture

Module 4: Hardening: Establishing a Secure Baseline

  • Windows NT/2000/2003 and XP
  • Windows 2000/2003/XP
  • Windows 2003
  • Windows Vista
  • Server 2003 Architecture
  • Broken Kernel
  • Modes of the OS
  • UNIX/Linux
  • Secure Server Guidelines
  • Hardening Systems
  • Security Compliance Manager
  • Device Security
  • Essential Steps to Harden Switches

LAB: Hardening

Windows Server 2008 Security (Part I)

  • Server 2008 Components
  • Enterprise Protection
  • AD RMS
  • AD RMS Components
  • EFS
  • EFS Enhancements in Server 2008
  • EFS Best Practices

LAB: Server 2008 Lab

Windows Server 2008 Security (Part II)

  • IPsec Rules
  • Firewall Scripting
  • netsh
  • Isolating a Server
  • Group Policy Object
  • Server Isolation Steps
  • Domain Isolation
  • Domain Isolation Issues
  • Best Practices
  • Trusted Platform Module
  • Wave Systems
  • TPM Architecture
  • Crypto API
  • Example
  • Embassy Server Software
  • Embassy Client Software
  • Self-Encrypting Drives

LAB: TPM

Module 5: Intrusion Detection and Prevention

  • Why Intrusion Detection?
  • Fortress Mentality
  • Intrusion Detection 101
  • What is Intrusion Detection?
  • False positives!
  • Topology concerns
  • Recommended in most circles
  • Realistic
  • Intrusion Prevention
  • Types of IPS
  • Host-Based Intrusion Prevention Systems
  • Host-Based Intrusion Prevention Systems

LAB: Intrusion Detection

Module 6: Protecting Web Applications

  • Top 10 www.owasp.org
  • Injection Flaws
  • Cross Site Scripting
  • Broken Authentication
  • Insecure Cryptographic Storage
  • Reverse Engineering Web Apps
  • Tools
  • Hackbar
  • Tamper Data
  • The Two Main Attacks for Web
  • XSS
  • SQL Injection
  • xp_cmdshell
  • There is More
  • More Tools
  • SQL Inject Me
  • XSS ME
  • Choose The Right Database
  • Practice, Practice, Practice
  • Tutorials
  • Mutillidae
  • Web Application Firewalls
  • Components of Web Application Firewall

LAB: Protecting Web Apps

Module 7: Memory Analysis

  • Data Types Revisited
  • Volatile
  • System date and time
  • Current network connections and Open ports
  • Processes that opened ports
  • Cached NetBIOS Names
  • Users Currently Logged On
  • Internal routing
  • Running Processes
  • Pslist
  • Trivia
  • Pslist –t
  • Tasklist
  • Tlist
  • Running Services
  • Open Files
  • Process Memory Dumps

LAB: Memory Analysis

Module 8: Endpoint protection

  • Introduction to NAC
  • NAC Defined
  • NAC General Architecture
  • NAC General Architecture Illustrated
  • NAC Concepts
  • Inline NAC
  • Out-of-Band
  • Identifying NAC Requirements
  • Implementing User-Based Identity Access Control
  • Network Access Protection (NAP)
  • NAP Components
  • NAP Enforcement
  • NAP Best Practices
  • 802.1x
  • EAP Explained
  • LAB 1: Network Access Protection with DHCP
  • LAB 2: Network Access Protection with IPsec
  • LAB 3: Endpoint Protection

Module 9: Securing Wireless

  • Wireless Tools
  • Wireless Vulnerabilities Summary
  • MAC Filtering
  • Hiding Access Points
  • Hijacking
  • Jamming
  • Identifying Targets
  • Wardriving
  • Sniffing on Wireless
  • Attacking Encrypted Networks
  • Wep Data
  • The other case
  • Reality
  • WPA Tools
  • WPA
  • LEAP
  • Asleap
  • Comparison

LAB: Securing Wireless

What's Included

Official EC-Council Courseware

  • CAST 614 - Advanced Network Defense

Prerequisites

Warning: This is not a beginner’s course. You'll be expected to know how to attempt attacks against many platforms and architectures. The instructor will challenge you to attack a device or system, then you will learn how to defend against it. The course is right for you if you're a: firewall administrator, system architect, or system / Windows administrator.

You must be familiar with IT security best practices, and have a good understanding of programming logic and common web technologies, as well as binary applications:

  • Basic Windows administration for servers and workstations
  • Basic Linux/NIX system administration skill
  • Basic command line proficiency on both Windows and NIX systems

Ideally, the you'll be EC-Council CEH or ECSA certified - or have the equivalent experience.

Weet je niet zeker of je aan de vereisten voldoet? Maak je geen zorgen. Jouw trainingsadviseur bespreekt jouw achtergrond met je om te begrijpen of deze cursus geschikt is voor je.

Beoordelingen

Wereldwijd heeft Firebrand in haar 10-jarig bestaan al 76283 studenten opgeleid! We hebben ze allemaal gevraagd onze versnelde opleidingen te evalueren. De laatste keer dat we onze resultaten analyseerden, bleek 96.74% ons te beoordelen als 'boven verwachting'


"I really liked how much knowledge I have gained these days"
Anoniem (25/11/2019 (Maandag) t/m 29/11/2019 (Vrijdag))

"Ontzettend zware training, die door het vriendelijke personeel dragelijk is gemaakt. Ik heb me uitstekend goed verzorgd gevoeld."
Roland van Ouwerkerk, Gemeente Dordrecht. (30/9/2019 (Maandag) t/m 4/10/2019 (Vrijdag))

"Extremely skilled teacher on forensics topics and security in general with always a pertinent feedback on his own past experience. His shared tips and techniques were very much appreciated."
Axel Pinsard, EY. (3/6/2019 (Maandag) t/m 7/6/2019 (Vrijdag))

"The instructor taught he material really well. There was a lot of material to cover and he managed it in an engaging effective manner. Thanks to the instructor"
Anonymous. (19/11/2018 (Maandag) t/m 23/11/2018 (Vrijdag))

"CEH course was a good mix of theory and practical labs. Really helpful to visualise the exam."
Anonymous. (19/11/2018 (Maandag) t/m 23/11/2018 (Vrijdag))

Cursusdata

Start datum

Eind datum

Status

Locatie

Nu boeken

25/5/2020 (Maandag)

27/5/2020 (Woensdag)

Beëindigde cursus - Geef feedback

-

 

28/9/2020 (Maandag)

30/9/2020 (Woensdag)

Wachtlijst

Landelijk

 

9/11/2020 (Maandag)

11/11/2020 (Woensdag)

Beperkte beschikbaarheid

Landelijk

 

21/12/2020 (Maandag)

23/12/2020 (Woensdag)

Open

Landelijk

 

1/2/2021 (Maandag)

3/2/2021 (Woensdag)

Open

Landelijk

 

15/3/2021 (Maandag)

17/3/2021 (Woensdag)

Open

Landelijk

 

Nieuwste beoordelingen van onze studenten