In this course, students learn how to create a defense in depth internal network by increasing the technical security knowledge of all individuals who create and operate systems, servers and workstations throughout your network. Think of it as the security awareness training that your IT staff has never taken. This course is geared for IT staff responsible for implementing and maintaining systems in your environment.
With a low ratio class and a 50/50 split between labs and theory, students gain an immense deal of hands on experience with the latest tools and techniques. At the end of the session, a Capture The Flag exercise is performed and students apply their newly gained knowledge against a server with various vulnerabilities.
Defense in Depth Topics
Perimeter Defense I: Attacking and Defending the Perimeter
Flashback session: Network Security Primer
Performing Target Reconnaissance
Learn the latest attacks against your network and how they circumvent existing technologies
Latest security assessment tools and techniques for networks
Attacking Network Devices and Latest Perimeter Security Technologies and Defensive Techniques
Universal Threat Management (Fortinet and Cisco ASA UTMs) Technologies and Features
Network Zoning (ITSG-22, NIST 800-53) Architecture
Internal Defense I: System Assessment
Security RADAR: Latest attack tools
Security RADAR: Latest Assessment tools and techniques
Getting to layer 7: Performing an attack from the ground up
Security Architecture Goals for Servers and Workstations
Checklist Discussion: Securing Windows Server 2003/2008
Checklist Discussion: Securing Windows workstation products
Checklist Discussion: Securing UNIX systems
Web Defense: Attacking and Securing External Servers and Services
Web 2.0 Threats and Defenses
Attacking web sites and applications
Web and SQL Servers Architecture Goals
Auditing Web Servers using well known tools
Auditing SQL Server service accounts
Locking down Web Servers and Web applications
Locking down SQL Servers
Capture The Flag - Final Lab
Take our IT Security Training for IT Staff and you could walk away with a new Apple iPAD!
Yes, it's true. Book for the upcoming IT Security Training for IT Staff and you could win a 16GB Apple iPad. The winner of the Capture the Flag event at the end of the course wins not only the title of CTF champion, but also wins a 16GB Apple iPAD.
Winning the CTF challenge won't be easy! Using all of the tools and techniques used in the course will be required to win. Obviously, with a prize like this on the line, every student will be bringing their best to the challenge.
Contact Intrinsec Technologies today, or click here to sign up. With a low ratio classroom, there are only a few spots available for you to be able to win the contest!
Attendees will receive the following:
Printed courseware manuals
Audit checklists for all systems (Windows servers, IIS servers, SQL Servers)
A USB key containing all of the tools used during the sessions
Who should attend?
System administrators with at least 2 years experience, analysts, network operations staff, Infrastructure architects, security managers, security directors.
For a list of dates and course pricing, please click here to access the on-line registration form