(Click Category to List Courses)
42 - IT-S Information Technology - Security and Audit
IT-S 185 - Switching & TCP/IP Concepts
Code | Start Date | Duration | Venue | |
---|---|---|---|---|
IT-S 185 | 04 November 2024 | 5 Days | Istanbul | Registration Form Link |
IT-S 185 | 02 December 2024 | 5 Days | Istanbul | Registration Form Link |
Course Description
Because networks require all the devices to follow the rules, this part starts with a discussion of networking models, which gives you a big-picture view of the networking rules. You can think of a networking model as you think of a set of architectural plans for building a house. A lot of different people work on building your house, such as framers, electricians, bricklayers, painters, and so on. The blueprint helps ensure that all the different pieces of the house work together as a whole. Similarly, the people who make networking products, and the people who use those products to build their own computer networks, follow a particular networking model. That networking model defines rules about how each part of the network should work, as well as how the parts should work together, so that the entire network functions correctly. Transmission Control Protocol/Internet Protocol (TCP/IP). TCP/IP is the most pervasively used networking model in the history of networking. You can find support for TCP/IP on practically every computer operating system (OS) in existence today, from mobile phones to mainframe computers. Every network built using Cisco products today supports TCP/IP.
Course Objectives
- Describe the essential elements of the TCP/IP protocol suite
- Explain the functions of various devices in a TCP/IP network
- Subnet an IP network using variable-length subnet masking (VLSM), calculating appropriate subnet values to improve network efficiency
- Describe different TCP/IP protocols—ARP, IP, ICMP, TCP, UDP, and so forth—including their functions and relationships
- Examine IP routing and the protocols that support it, such as RIP, EIGRP, OSPF, and BGP
- Explain how applications like FTP, HTTP, Telnet, and others work in a TCP/IP network
- Analyze UDP and TCP application traffic to identify normal versus abnormal sessions
- Automate address assignment and name resolution using DHCP and DNS
- Analyze multicasting and Voice over IP (VoIP) traffic to determine how these protocols affect network performance
- Troubleshoot problems at each layer of a TCP/IP network using a variety of tools, including a protocol analyzer, traceroute, ping, and DNS and ARP cache manipulation
- Analyze ICMP variation reports to determine the cause of a network failure
- Explore network security protocols, including PPTP, L2TP, IPSec, SSL, TLS, and SSH
- Analyze network traffic to determine security risks
- Explore the functions of IPv6 and its related protocols
Who Should Attend?
- Security Analyst
- Security Architects
- Senior Security Engineers
- Technical Security Managers
Course Details/Schedule
Day 1
- Introduction to Switching & TCP/IP Concepts
- Switching Concepts (CAM, MAC, Ebtables, and Port Mapping & Security etc.) o VLAN 802.1Q (Tagged vs. Untagged Traffic etc.)
- Collision domain o Spanning Tree Protocol (STP), RSTP o ARP Security and floods
- TCP/IP Protocol Suite
- Network Infrastructure
- Common TCP/IP Attacks
Day 2
- Network architecture & security
- Networking Protocols and Networking Devices
- Layer 2 Fundamentals and Technologies
- Layer2 headers and checksum
- Internet Protocol and Layer 3 Technologies
- Internet Control Message Protocol (ICMP)
- Domain Control System (DNS)
- Introduced IPv6
- Transport Layer Technologies and Protocols
- Data Loss Prevention
- Network Flows
Day 3
- Network Applications and Security
- Network & Information Security Concepts
- Network & their Common Network Application Attacks
- Understanding Linux Operating System and Network architectures.
- Network Security Technologies
Day 4
- Security Monitoring and Analysis
- Security Data Collection and Diagnosis on Network Devices
- Security Event Analysis
- SOC Overview
- Defining the Security Operations Center
- Network Monitoring Tools and Data
- Incident Analysis in a Threat-Centric SOC
- Identifying Resources for Hunting Cyber Threats
Day 5
- Security Incident Investigations
- Event Correlation and Normalization
- Common Attack Vectors
- Identifying Patterns of Suspicious Behaviour
- SOC Operations
- Describing the SOC Playbook
- Understanding the SOC Metrics
- Understanding the SOC WMS and Automation
- Incident Response Plan
- Computer Security Incident Response Team