Assessing and Securing the Perimeter

Mastery of multiple security techniques are required to defend your network from remote attacks. Infosec’s Assessing and Securing the Perimeter takes you there.

Award Winning Training

For 17 years InfoSec has been one of the most awarded and trusted information security training vendors - 42 industry awards!

Analysts Recommended

IDC lists Infosec as Major Player in their Security Training Vendor Assessment.

Assessing & Securing the Perimeter Course Overview

In today’s security landscape, the network perimeter has ceased to be a single, easily definable boundary. In order to mount a defense from outside attacks on your network, information security experts are required to have a deep and diverse understanding of a number of technologies and applications.

This course will offer hands-on problem solving in a lab setting. You will learn how to identify and address potential weaknesses in realistic scenarios. You will be presented with a variety of open-source and commercial products in this course, offering the widest possible view of potential threats and possible situations.

Award-winning training that you can trust.

Rising Star

Partner Award

G2 Crowd Leader

Technical Skills Development Software

Gold Winner

Best Cybersecurity Education Provider

Publisher's Choice

Security Training for Infosec Professionals

Top 20 Company

IT Training

What You'll LEARN & DO:

    Day 1 – TCP/IP Weapons School and Defenses

    • Packet Investigation Tools
    • Wireshark
    • dsniff
    • OSI Layer 2 Attacks and Defenses
    • Address Resolution Protocol (ARP)
    • ARP spoofing
    • Session Hijacking
    • OSI Layer 3 Attacks and Defenses
    • IP Header Fields
    • Packet Fragmentation
    • Covert Channels
    • OSI Layer 4 & 5 Attacks and Defenses’
    • TCP & UDP Headers
    • TCP Sequence Numbers
    • Port Scanning Prevention
    • ICMP Traffic Control
    • IPv6 Attacks and Defenses
    • IPv6 Headers and Addressing
    • IPv6 Attacks
    • SLAAC Attacks

    Day 2 – Firewall and Router Defenses

    • Secure DMZ Design
    • Network Address Translation
    • NAT Security Concerns
    • Packet Filtering
    • Vulnerability of packet filtering devices
    • Stateful Inspection
    • Stateful Inspection Security Considerations
    • Border & Gateway Routers
    • Border Router Filtering Best Practices
    • Proxy Devices
    • Proxy Settings and Security
    • Enterprise Firewall Rule Management
    • Top 10 Most Common Cisco router attacks and defenses

    Day 3 – Security Event Monitoring and Detection

    • Intrusion Detection and Prevention
    • How to write IDS Rules
    • Detecting Attacks
    • Network abuse signatures
    • Attack Signatures
    • Advanced Attack Signatures
    • Remote exploit command shell signatures
    • Network mapping with NMAP
    • Identifying and responding to DDoS attacks
    • False Positive Analysis
    • False Negative Analysis
    • Security Device Log Analysis
    • Antivirus Log Analysis
    • Unified Threat Management
    • SIM Architecture
    • NTP settings
    • Firewall log detection

    Day 4 – Operating System Security and Remote Access Security

    • Virtual Private Network (VPN) Security
    • IPSEC Overview
    • VPN design considerations
    • Wireless Security
    • WEP, WPA, WPA2
    • 802.1x Security
    • Network Access Control
    • NAC vs. Cisco NAC
    • Securing Servers
    • Patching
    • Password Security
    • Policy Management
    • Automated hardening tools / scripts
    • Securing DNS
    • Securing Web Servers
    • Securing SMTP
    • Vulnerability Assessment

    Day 5 – Securing Web Applications and Client Security

    • Client Attacks
    • Spearphishing
    • Attacking and Defending Microsoft Office
    • Attacking and Defending Internet Browsers
    • OWASP Top 10 Application Security Risks
    • Cross Site Scripting
    • Directory Traversal
    • Web Application Vulnerability Scanners

    What Our Students Are Saying

    Without any question, InfoSec has the most gifted individual instructors. Our instructor for this class was both an excellent educator and a premier/world class security expert. He was able to clearly explain and impart to the students, the most complicated security techniques I have ever heard of or imagined. I simply can not find the words to recommend him and Infosec security training more highly.

    John Hollan GE

    Advanced Ethical Hacking Training Boot Camp

    Career Tracks

    • Critical Infrastructure Track

    • Information Assurance Track

      The IA track goes through all aspects of Information Assurance. Our goals with this set of courses is to create the most complete Security Manager an organization could wish for.
    • Security Pro Track

      The Security Pro Track goes through all aspects of Information Security. Our goals with this set of courses is to create the most complete Security Specialist an organization could wish for.