Looking for Global training? Go to https://firebrand.training/en or stay on the current site (Sverige)

X

One way or another, we get you certified
Our accelerated courses are now available online. Save 50% on a second course if you attend one before the end of April 2020.

EC-Council CAST - Advanced Network Defense

- Just 3 Days

The EC-Council Centre of Advanced Security Training has arrived at Firebrand Training. This three-day Advanced Network Defense course is intensive, and will make you think like a hacker. You will learn how to defend against the latest attacks.

Warning: This is not a beginner’s course. You'll be expected to know how to attempt attacks against many platforms and architectures. The instructor will challenge you to attack a device or system, then you will learn how to defend against it. The course is right for you if you're a: firewall administrator, system architect, or system / Windows administrator.

You will learn:

  • How to identify security weaknesses in computer systems or networks, before it's too late
  • How to use hacking and pen testing to defend against various attacks
  • Best practices in developing secure system and network configurations
  • How to deploy machines in a protected state
  • Techniques critical to the protection of your entire enterprise against some of today’s most advanced threats
  • How to detect malware

Note: this course doesn't include an exam, but you'll become Advanced Network Defense certified.

Read more...

9x Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 700 training centres across 107 countries. This extends a record-breaking run of successive awards to nine years.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

See Benefits...

See prices now to find out how much you could save when you train at twice the speed.

Four reasons why you should sit your CAST AND course with Firebrand Training

  1. You'll be CAST AND trained and certified faster. Learn more on this 3-day accelerated course. You'll get at least 12 hours a day of quality learning time in a distraction-free environment
  2. Your CAST AND course is all-inclusive. One simple price covers all course materials, exams, accommodation and meals – so you can focus on learning
  3. Pass CAST AND first time or train again for free. Your expert instructor will deliver our unique accelerated learning methods, allowing you to learn faster and be in the best possible position to pass first time. In the unlikely event that you don't, it's covered by your Certification Guarantee
  4. Study CAST AND with an award-winning training provider. We've won the Learning and Performance Institute's "Training Company of the Year" three times. Firebrand is your fastest way to learn, with 75.346 students saving more than one million hours since 2001

Think you are ready for the course? Take a FREE practice test to assess your knowledge!

Module 1: Firewalls

  • Firewalls
  • Firewall Types: Stateless Packet Filters
  • Improving Device Remote-Access Security
  • Locking Down the Console Port
  • Protecting Terminal Lines
  • Establishing Encrypted Communications
  • Configuring HTTPS
  • Configuring SSH

LAB: Securing the Perimeter

Module 2: Advanced Filtering

  • Advanced Filtering Techniques
  • Ingress Filtering
  • Egress Filtering
  • Source Address Verification (SAV)
  • uRPF
  • Additional Filtering Considerations
  • Time-Based ACLs
  • Reflexive ACLs
  • Reflexive ACL vs. Static ACL
  • Context-Based Access Control (CBAC)
  • Essential Steps to Harden Routers

LAB: Advanced Filtering

Module 3: Firewall Configuration

  • Firewall Types: Stateful Packet Filters
  • Application Proxies
  • Application Proxies vs. Stateful Packet filters
  • Web Application Firewalls
  • Web Application Firewall Types
  • Web Application Firewall Products
  • Firewall Architecture
  • Screened Subnet Firewall
  • The Classic Firewall Architecture
  • Belt and Braces Firewall
  • Separate Services Subnet
  • Fortress Mentality
  • De-parameterization
  • Perimeter Configuration

LAB: Selecting a Firewall Architecture

Module 4: Hardening: Establishing a Secure Baseline

  • Windows NT/2000/2003 and XP
  • Windows 2000/2003/XP
  • Windows 2003
  • Windows Vista
  • Server 2003 Architecture
  • Broken Kernel
  • Modes of the OS
  • UNIX/Linux
  • Secure Server Guidelines
  • Hardening Systems
  • Security Compliance Manager
  • Device Security
  • Essential Steps to Harden Switches

LAB: Hardening

Windows Server 2008 Security (Part I)

  • Server 2008 Components
  • Enterprise Protection
  • AD RMS
  • AD RMS Components
  • EFS
  • EFS Enhancements in Server 2008
  • EFS Best Practices

LAB: Server 2008 Lab

Windows Server 2008 Security (Part II)

  • IPsec Rules
  • Firewall Scripting
  • netsh
  • Isolating a Server
  • Group Policy Object
  • Server Isolation Steps
  • Domain Isolation
  • Domain Isolation Issues
  • Best Practices
  • Trusted Platform Module
  • Wave Systems
  • TPM Architecture
  • Crypto API
  • Example
  • Embassy Server Software
  • Embassy Client Software
  • Self-Encrypting Drives

LAB: TPM

Module 5: Intrusion Detection and Prevention

  • Why Intrusion Detection?
  • Fortress Mentality
  • Intrusion Detection 101
  • What is Intrusion Detection?
  • False positives!
  • Topology concerns
  • Recommended in most circles
  • Realistic
  • Intrusion Prevention
  • Types of IPS
  • Host-Based Intrusion Prevention Systems
  • Host-Based Intrusion Prevention Systems

LAB: Intrusion Detection

Module 6: Protecting Web Applications

  • Top 10 www.owasp.org
  • Injection Flaws
  • Cross Site Scripting
  • Broken Authentication
  • Insecure Cryptographic Storage
  • Reverse Engineering Web Apps
  • Tools
  • Hackbar
  • Tamper Data
  • The Two Main Attacks for Web
  • XSS
  • SQL Injection
  • xp_cmdshell
  • There is More
  • More Tools
  • SQL Inject Me
  • XSS ME
  • Choose The Right Database
  • Practice, Practice, Practice
  • Tutorials
  • Mutillidae
  • Web Application Firewalls
  • Components of Web Application Firewall

LAB: Protecting Web Apps

Module 7: Memory Analysis

  • Data Types Revisited
  • Volatile
  • System date and time
  • Current network connections and Open ports
  • Processes that opened ports
  • Cached NetBIOS Names
  • Users Currently Logged On
  • Internal routing
  • Running Processes
  • Pslist
  • Trivia
  • Pslist –t
  • Tasklist
  • Tlist
  • Running Services
  • Open Files
  • Process Memory Dumps

LAB: Memory Analysis

Module 8: Endpoint protection

  • Introduction to NAC
  • NAC Defined
  • NAC General Architecture
  • NAC General Architecture Illustrated
  • NAC Concepts
  • Inline NAC
  • Out-of-Band
  • Identifying NAC Requirements
  • Implementing User-Based Identity Access Control
  • Network Access Protection (NAP)
  • NAP Components
  • NAP Enforcement
  • NAP Best Practices
  • 802.1x
  • EAP Explained
  • LAB 1: Network Access Protection with DHCP
  • LAB 2: Network Access Protection with IPsec
  • LAB 3: Endpoint Protection

Module 9: Securing Wireless

  • Wireless Tools
  • Wireless Vulnerabilities Summary
  • MAC Filtering
  • Hiding Access Points
  • Hijacking
  • Jamming
  • Identifying Targets
  • Wardriving
  • Sniffing on Wireless
  • Attacking Encrypted Networks
  • Wep Data
  • The other case
  • Reality
  • WPA Tools
  • WPA
  • LEAP
  • Asleap
  • Comparison

LAB: Securing Wireless

See What's Included...

Official EC-Council Courseware

  • CAST 614 - Advanced Network Defense

Your accelerated course includes:

  • Accommodation
  • Meals, unlimited snacks, beverages, tea and coffee
  • On-site exams**
  • Exam vouchers**
  • Practice tests*
  • Certification Guarantee**
  • Courseware
  • Up-to 12 hours of instructor-led training each day
  • 24-hour lab access
  • Hands-on training through Lecture | Lab | ReviewTM
  • Digital courseware (if available)
  • * Some exceptions apply
  • ** Some exceptions apply. Please refer to the Exam Track
  • *** Pass first time or train again free (just pay for accommodation, exams and incidental costs)

See Prerequisites...

Warning: This is not a beginner’s course. You'll be expected to know how to attempt attacks against many platforms and architectures. The instructor will challenge you to attack a device or system, then you will learn how to defend against it. The course is right for you if you're a: firewall administrator, system architect, or system / Windows administrator.

You must be familiar with IT security best practices, and have a good understanding of programming logic and common web technologies, as well as binary applications:

  • Basic Windows administration for servers and workstations
  • Basic Linux/NIX system administration skill
  • Basic command line proficiency on both Windows and NIX systems

Ideally, the you'll be EC-Council CEH or ECSA certified - or have the equivalent experience.

Are you ready to get certified in record time?

We interview all applicants for the course on their technical background, degrees and certifications held, and general suitability. If you get through this screening process, it means you stand a great chance of passing.

Firebrand Training is an immersive training environment. You must be committed to the course. The above prerequisites are guidelines, but many students with less experience have other background or traits that have enabled their success in accelerated training through Firebrand Training.

If you have any doubts as to whether you meet the pre-requisites please call (0)8 52 50 01 66 and speak to one of our enrolment consultants, who can help you with a training plan.

See When...

EC-Council CAST AND Course Dates

Start

Finish

Status

Location

Book now

25/11/2019 (Monday)

27/11/2019 (Wednesday)

Finished

-

 

30/3/2020 (Monday)

1/4/2020 (Wednesday)

Wait list

Nationwide

 

11/5/2020 (Monday)

13/5/2020 (Wednesday)

Limited availability

Nationwide

 

22/6/2020 (Monday)

24/6/2020 (Wednesday)

Open

Nationwide

 

3/8/2020 (Monday)

5/8/2020 (Wednesday)

Open

Nationwide

 

14/9/2020 (Monday)

16/9/2020 (Wednesday)

Open

Nationwide

 

We've currently trained 75.346 students in 12 years. We asked them all to review our Accelerated Learning. Currently,
96,78% have said Firebrand exceeded their expectations:

"Excellent course for it security leaders with facilities to watch... Highly recommended"
Steve Mcdonnell, Prepaid Financial Services Ltd. (4/3/2020 to 6/3/2020)

"Excellent way to focus attention"
Richard Sowden, Tilney. (4/3/2020 to 6/3/2020)

"It was a very good training. I appreciated a lot trainers expertise and professionalism. I would recommend this training to my colleagues."
Julien JOUANNET, Network and Security. (16/12/2019 to 20/12/2019)

"The CEH class conducted by Firebrand''s instructor was quite interesting, I learned something new for myself and deepened existing knowledge. It was a please to work with a such skilled trainer."
M.O., Amadeus. (16/12/2019 to 20/12/2019)

"The instructor was very clear and had interesting experiences to share, illustrating lots of training cases. I recommend."
V.M.. (16/12/2019 to 20/12/2019)

Latest Reviews from our students