Email Us   Phone : 503-259-0312   
  Home    |    Instructor-led Training    |    Self-Paced Learning    |    Online Training     


Contact Us   -   Why Choose Wintrac   -   Clients    

Courses
ADA
Adobe
Agile
AJAX
Android
Apache
AutoCAD
Big Data
Business Analysis
Business Intelligence
Business Objects
Business Skills
C++ programming
Cisco
Citrix
Cloud Computing
COBOL
Cognos
ColdFusion
COM/COM+
CompTIA
CORBA
CRM
Crystal Reports
Datawarehousing
DB2
Desktop Application Software
DNS
Embedded Systems
Google Web Toolkit (GWT)
IPhone
ITIL
Java
JBoss
LDAP
Leadership Development
Lotus
Machine learning/AI
Macintosh
Mainframe programming
Microsoft technologies
Mobile
MultiMedia and design
.NET
NetApp
Networking
New Manager Development
Object oriented analysis and design
OpenVMS
Oracle
Oracle VM
Perl
PHP
PowerBuilder
Professional Soft Skills Workshops
Project Management
Rational
Ruby
Sales Performance
SAP
SAS
Security
SharePoint
SOA
Software quality and tools
SQL Server
Sybase
Symantec
Telecommunications
Teradata
Tivoli
Tomcat
Unix/Linux/Solaris/AIX/
HP-UX
Visual Basic
Visual Foxpro
VMware
Web Development
WebLogic
WebSphere
Websphere MQ (MQSeries)
Windows programming
XML
XML Web Services
Other
Linux Network Security
Linux Training Overview

This extremely popular class focuses on network security, and makes an excellent companion class to the Enterprise Linux Security Administration  course. After a detailed discussion of the TCP/IP suite component protocols and Ethernet operation, the student practices using various tools to capture, analyze, and generate IP traffic. Students then explore the tools and techniques used to exploit protocol weaknesses and perform more advanced network attacks. After building a thorough understanding of network based attacks, course focus shifts to the defensive solutions available. Students install, configure, and test one of the most popular and powerful NIDS solutions available. Finally, students create a Linux based router / firewall solution, including advanced functionality such as NAT, policy routing, and traffic shaping.

Linux Training Prerequisites

Prerequisites: Since the tools used in class are compiled and run on a Linux system, Linux or UNIX system experience is helpful, but not necessary. A solid background in networking concepts will greatly aid incomprehension. This is an intense class that covers many topics.

Courseware supports latest versions of Red Hat Enterprise Linux, Fedora Core, SUSE LINUX Professional, and SUSE LINUX Enterprise Server.

Linux Training Course duration

40 Hours

Linux Training Course outline

Section 1 Ethernet and IP Operation

  • OSI Network Model
  • Application Layers
  • Network Services Layers
  • Moving Data Through The Stack
  • Data Link Layer Format
  • Ethernet Operation
  • Hub and Switch Operation
  • Ethernet Security Issues
  • Detecting Promiscuous NICs
  • Network Packet Capture
  • tcpdump
  • Ethereal
  • IPv4
  • IP Addressing
  • Differentiated Services
  • IP Fragmentation
  • Path MTU Discovery
  • ARP
  • ICMP
  • ICMP Redirects
  • Important ICMP Messages
  • ICMP Security Issues
  • Protecting Against ICMP Abuse
      Lab 1 - Basic Traffic Generation, Capture, and Analysis
  • Capture and analyze ARP traffic with a variety of tools
  • Capture and analyze ICMP echo, unreachable, and redirect messages
  • Explore the differences between a variety of traffic capture utilities and their interfaces and options
Section 2 IP and ARP Vulnerability Analysis
  • IP Security Issues
  • IP Routing
  • Routing Protocol Security
  • Protecting Against IP Abuse
  • RP Security Issues
  • Cache Poisoning with ARP Replies
  • Cache Poisoning with ARP Requests
  • ARP Cache Poisoning Defense
      Lab 2 - Advanced Traffic Generation, and Capture
  • Learn to use a variety of tools to generate traffic, including forged headers.
  • Use ARP cache "poisoning" to capture traffic on a switched LAN
  • Use various techniques to discover if a NIC is in promiscuous mode
Section 3 UDP/TCP Protocol and TELNET Vulnerability Analysis
  • User Datagram Protocol
  • UDP Segment Format
  • Transmission Control Protocol
  • TCP Segment Format
  • TCP Port Numbers
  • TCP Sequence / Acknowledgment #ís
  • TCP Three-way Handshake
  • TCP Window Size
  • The TCP State Machine
  • The TCP State Transitions
  • TCP Connection Termination
  • TCP SYN Attack
  • TCP Sequence Guessing
  • TCP Connection Hijacking
  • Telnet
  • Telnet Concepts - Options
  • Telnet Concepts - Commands
  • Telnet Security Concerns
      Lab 3 - Attacks on TCP
  • Use forged packets to slow and kill TCP sessions.
  • Monitor and hijack a telnet session
Section 4 FTP and HTTP Vulnerability Analysis
  • FTP
  • Modes
  • Transfer Methods
  • Security Concerns
  • The Bounce Attack
  • Minimizing Risk
  • FTP - Port Stealing
  • Brute-force Attacks
  • Access Restriction
  • Privacy
  • HTTPv1.1
  • HTTP Protocol Parameters
  • HTTP Message
  • HTTP Request/Method Definitions
  • Response/Status Codes
  • Proxies
  • Authentication
  • Security Concerns
  • Personal Information
  • Attacks On File and Path Names
  • Header Spoofing
  • Auth Credentials and Idle Clients
  • Proxy Servers
      Lab 4 - Attacks on FTP and HTTP
  • Use dsniff to capture FTP and HTTP passwords
  • Bonus exercise: Use urlsnarf and webspy to monitor a web browser
Section 5 DNS Protocol Vulnerability Analysis
  • DNS
  • DNS Basic Concepts and Terms
  • DNS Resolution
  • DNS Zone Transfers
  • DNS Spoofing
  • DNS Cache Poisoning
  • DNS Security Improvements
      Lab 5 - Attacks on DNS
  • Use dnsspoof to forge DNS responses to redirect web traffic
  • Use forged DNS responses to circumvent host based access security
Section 6 SSH and HTTPS Protocol Vulnerability Analysis
  • SSH Concepts
  • Initial Connection
  • Protocols
  • SSH1
  • SSH2
  • Encryption Vulnerabilities
  • SSH Vulnerabilities
  • SSH1 Insertion Attack
  • SSH Brute Force Attack
  • SSH1 CRC Compensation Attack
  • Bleichenbacher Oracle
  • SSH1 Session Key Recovery
  • Client Authentication Forwarding
  • Host Authentication Bypass
  • X Session Forwarding
  • HTTPS Protocol Analysis
  • SSL Enabled Protocols
  • SSL protocol
  • SSL Layers
  • The SSL Handshake
  • SSL Vulnerabilities
  • Intercepted Change Cipher Spec
  • Intercepted Key Exchange
  • Version Rollback Attack
      Lab 6 - HTTPS and SSH
  • Perform a man-in-the-middle attack on secure web connections.
  • Perform a man-in-the-middle attack on SSH v1 connections.
  • erform a timing and packet length attack on SSH v1 and SSH v2 connections.
Section 7 Remote Operating System Detection
  • OS Detection
  • Banners
  • Commands
  • Less-direct Approaches
  • TCP/IP Stack Fingerprinting
  • Remote Fingerprinting Apps
  • nmap
      Lab 7 - Using nmap
  • Use the Nmap utility to perform general network sweep scans.
  • Use Nmap to perform a wide variety of scans on a host.
  • Use Nmap to perform TCP/IP fingerprinting for remote OS detection.
Section 8 Attacks and Basic Attack Detection
  • Sources of Attack
  • Denial-of-Service Attacks
  • Methods of Intrusion
  • Exploit Software Bugs
  • Exploit System Confiuration
  • Exploit Design Flaws
  • Password cracking
  • Typical Intrusion Scenario
  • Intrusion Detection
  • IDS Considerations
  • Attack Detection Tools
  • Klaxon
  • PortSentry
  • PortSentry Design
  • Snort
      Lab 8 - Basic Scan Detection
  • Examine standard system logs and statistics for signs of attack
  • Configure portsentry to log port scans from nmap
  • Configure portsentry for active response to port scans
Section 9 Intrusion Detection Technologies
  • Intrusion Detection Systems
  • Host Based IDS
  • Network Based IDS
  • Network Node IDS
  • File Integrity Checkers
  • Hybrid NIDS
  • Honeypots
  • Focused Monitors
  • Snort Architecture
  • Snort Detection Rules
  • Snort Logs and Alerts
  • Snort Rules
      Lab 9 - Exploring Snort
  • Install snort
  • Test Snort to see if it detects Nmap scans
  • Use Snort to examine network traffic in decoded text format
  • Use Snort to capture all network packets in tcpdump-style binary logs
  • Use tethereal to analyze captured packets
  • Setup Snort to log to SYSLOG
Section 10 Advanced Snort Configuration
  • Advanced snort Features
  • snort Add-ons
  • ACID Web Console
  • The ACID Interface
  • SnortCenter Management
      Lab 10 - Snort Tools
  • Set up a new MySQL database for use with snort
  • Configure snort to log to the new database
  • Set up and test the ACID analysis tool
  • Setup and configure SnortCenter
  • Install and configure the Linux SnortCenter Sensor Agent
  • Observe how snort and ACID respond to attacks.
Section 11 Snort Rules
  • Snort Rules Format
  • Snort Rules Options
  • Writing Snort Rules
  • Example Rules
      Lab 11 - Custom Snort Rules
  • Capture packet from exploit that Snort does not currently detect
  • Write a custom rule for snort to detect the exploit
  • Verify exploit detection
Section 12 Linux and Static Routing
  • Linux As a Router
  • Linux Router Minimum Requirements
  • Router Focused Distributions
  • Router Specific Settings
      Lab 12 - Static Routing
  • Configure your host to act as a router
  • Configure and test "automatic" anti-spoofing protection
  • Configure the system to implement the above automatically on reboot
Section 13 Linux Firewalls
  • Types of Firewalls
  • Application Firewalls:TCP Wrappers
  • Application Firewalls: Squid
  • Packet Filter: ipchains
  • Stateful Packet Filter: iptables
  • Firewall Topology
  • Recommended Firewall Rules
  • Firewall Limitations
  • iptables Concepts
  • Using iptables
  • Advanced iptables Actions
  • iptables: A More Secure Approach
      Lab 13 - IPtables
  • Use iptables to filter traffic destined to your host
  • Use iptables to log traffic destined to a specific port on your host
Section 14 Network and Port Address Translation
  • Address Translation
  • Configuring NAT and PAT
  • NAT Limitations

 
About us
Contact us
Careers at Wintrac
Our Clients
Why Wintrac


Register for a free training CD-ROM drawing
Refer a client or instructor and earn $$$


Wintrac Inc.
16523 SW McGwire Ct.
Beaverton OR 97007
 
© Wintrac, Inc. All rights reserved.                                                                               Site Map   |   Terms of Use   |   Privacy Policy