Main Menu
My Infosec
Main Menu
My Infosec

Assessing and Securing the Perimeter

Mastery of multiple security techniques are required to defend your network from remote attacks. InfoSec Institute’s Assessing and Securing the Perimeter takes you there.

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted information security training vendors - 42 industry awards!

Analysts Recommended

IDC lists InfoSec Institute as Major Player in their Security Training Vendor Assessment.

Assessing & Securing the Perimeter Course Overview

In today’s security landscape, the network perimeter has ceased to be a single, easily definable boundary. In order to mount a defense from outside attacks on your network, information security experts are required to have a deep and diverse understanding of a number of technologies and applications.

This course will offer hands-on problem solving in a lab setting. You will learn how to identify and address potential weaknesses in realistic scenarios. You will be presented with a variety of open-source and commercial products in this course, offering the widest possible view of potential threats and possible situations.

View Pricing

We will never share any of your information, spam you or annoy you with pushy sales pitches.

Award-Winning Training

What You'll LEARN & DO:

    Day 1 – TCP/IP Weapons School and Defenses

    • Packet Investigation Tools
    • Wireshark
    • dsniff
    • OSI Layer 2 Attacks and Defenses
    • Address Resolution Protocol (ARP)
    • ARP spoofing
    • Session Hijacking
    • OSI Layer 3 Attacks and Defenses
    • IP Header Fields
    • Packet Fragmentation
    • Covert Channels
    • OSI Layer 4 & 5 Attacks and Defenses’
    • TCP & UDP Headers
    • TCP Sequence Numbers
    • Port Scanning Prevention
    • ICMP Traffic Control
    • IPv6 Attacks and Defenses
    • IPv6 Headers and Addressing
    • IPv6 Attacks
    • SLAAC Attacks

    Day 2 – Firewall and Router Defenses

    • Secure DMZ Design
    • Network Address Translation
    • NAT Security Concerns
    • Packet Filtering
    • Vulnerability of packet filtering devices
    • Stateful Inspection
    • Stateful Inspection Security Considerations
    • Border & Gateway Routers
    • Border Router Filtering Best Practices
    • Proxy Devices
    • Proxy Settings and Security
    • Enterprise Firewall Rule Management
    • Top 10 Most Common Cisco router attacks and defenses

    Day 3 – Security Event Monitoring and Detection

    • Intrusion Detection and Prevention
    • How to write IDS Rules
    • Detecting Attacks
    • Network abuse signatures
    • Attack Signatures
    • Advanced Attack Signatures
    • Remote exploit command shell signatures
    • Network mapping with NMAP
    • Identifying and responding to DDoS attacks
    • False Positive Analysis
    • False Negative Analysis
    • Security Device Log Analysis
    • Antivirus Log Analysis
    • Unified Threat Management
    • SIM Architecture
    • NTP settings
    • Firewall log detection

    Day 4 – Operating System Security and Remote Access Security

    • Virtual Private Network (VPN) Security
    • IPSEC Overview
    • IPSEC VPNs SSL VPNs
    • VPN design considerations
    • Wireless Security
    • WEP, WPA, WPA2
    • 802.1x Security
    • Network Access Control
    • NAC vs. Cisco NAC
    • Securing Servers
    • Patching
    • Password Security
    • Policy Management
    • Automated hardening tools / scripts
    • Securing DNS
    • Securing Web Servers
    • Securing SMTP
    • Vulnerability Assessment

    Day 5 – Securing Web Applications and Client Security

    • Client Attacks
    • Spearphishing
    • Attacking and Defending Microsoft Office
    • Attacking and Defending Internet Browsers
    • OWASP Top 10 Application Security Risks
    • Cross Site Scripting
    • Directory Traversal
    • Web Application Vulnerability Scanners

    Book your course

      What Our Students Are Saying

      Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.
      JH

      John Hollan GE

      Advanced Ethical Hacking Training Boot Camp

      Career Tracks

      • Critical Infrastructure Track

      • Information Assurance Track

        The IA track goes through all aspects of Information Assurance. Our goals with this set of courses is to create the most complete Security Manager an organization could wish for.
      • Security Pro Track

        The Security Pro Track goes through all aspects of Information Security. Our goals with this set of courses is to create the most complete Security Specialist an organization could wish for.
      Ready to get started? Get instant pricing for this award-winning boot camp. View course pricing
      View instant course pricing