SEC 450: Firewalls and Network Security

(WU-SEC450.AP1)
Lessons
Lab
TestPrep
Get A Free Trial

Skills You’ll Get

1

Introduction to Network Security

  • Introduction
  • The Basics of a Network
  • Basic Network Utilities
  • The OSI Model
  • What Does This Mean for Security?
  • Assessing Likely Threats to the Network
  • Classifications of Threats
  • Likely Attacks
  • Threat Assessment
  • Understanding Security Terminology
  • Choosing a Network Security Approach
  • Network Security and the Law
  • Using Security Resources
  • Risk management programs
  • Security audits
  • Conducting security assessments
2

Malicious Software

  • Types of Malicious Software (Malware)
  • Advanced Persistent Threat
  • Propagation—Infected Content—Viruses
  • Propagation—Vulnerability Exploit—Worms
  • Propagation—Social Engineering—Spam e-mail, Trojans
  • Payload—System Corruption
  • Payload—Attack Agent—Zombie, Bots
  • Payload—Information Theft—Keyloggers, Phishing, Spyware
  • Payload—Stealthing—Backdoors, Rootkits
  • Countermeasures
  • Distributed Denial of Service Attacks
3

Firewalls and Demilitarized Zone (DMZ)

  • What Is a Firewall?
  • Implementing Firewalls
  • Firewall Deployment
  • Selecting and Using a Firewall
  • Using Proxy Servers
  • Using Single Machine Firewalls
  • Windows 10 Firewall
  • User Account Control
  • Linux Firewalls
  • Using Small Office/Home Office Firewalls
  • Using Medium-Sized Network Firewalls
  • Using Enterprise Firewalls
4

Intrusion Prevention Systems

  • Understanding IDS Concepts
  • IDS Components and Processes
  • SIEM
  • Evasion Techniques
  • Understanding and Implementing IDSs
  • Understanding and Implementing Honeypots
5

Network Security Protocols

  • Network security components
  • Secure network protocols
  • Hardening networks
6

Advanced Firewall and IPS Configurations

  • Access control principles
  • Account management
  • Integrating Firewalls with IPS
  • Monitoring and Logging
7

Case Studies and Emerging Trends

  • AI and Cybersecurity
  • Offensive Cyber and Cyberwarfare
  • Quantum Computing and Computer Security
  • Best Practices for Security Management

1

Introduction to Network Security

  • Configuring an IPv6 Address
  • Configuring a CIDR-Based IP Address
  • Viewing the MAC Address on Different Interfaces
  • Using Command-Line Tools
  • Analyzing Malware
  • Gathering Site Information
  • Using the theHarvester Tool
  • Cracking a Linux Password Using John the Ripper
  • Footprinting a Website
2

Malicious Software

  • Creating a Remote Access Trojan (RAT)
  • Installing Antivirus Software
  • Configuring IPSec
  • Testing an Antivirus Program
  • Simulating a DoS Attack
  • Simulating a DDoS Attack
3

Firewalls and Demilitarized Zone (DMZ)

  • Creating a DMZ Zone
  • Using Windows Firewall
  • Configuring a Proxy Server
  • Configure User Access Control Settings
  • Configuring a Linux Firewall Using iptables
4

Intrusion Prevention Systems

  • Performing IDS Configuration with Snort
  • Setting up a Honeypot
5

Network Security Protocols

  • Securing a Wi-Fi Hotspot
  • Binding a Site Using IIS
  • Configuring a VPN
  • Requesting PKI Certificates
  • Scanning the Network
6

Advanced Firewall and IPS Configurations

  • Creating Linux Users and Groups
  • Enforcing Password Policies
  • Delegating Control in Active Directory
  • Creating a Windows Domain User

Related Courses

All Courses
scroll to top