Overview
This course is the official courseware for the Security Certified Program SC0-451 certification exam. The Tactical Perimeter Defense course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The network perimeter is often the first line of defense in an organization’s network, and this course covers the issues every administrator must be familiar with.
To ensure your success, we recommend that you have CompTIA’s Security+ certification, or have equivalent experience. This course assumes that the reader has fundamental working knowledge of networking concepts, and foundational security knowledge.
Instructor-led, group-paced, classroom-delivery learning model with structured hands-on activities.
You will need:
Prerequisites
Delivery Method
Hardware/Software Requirements
Performance-Based Objectives
Lesson 2
WinPcap_4_0.exe
SCNS Book CD
wireshark-setup-0.99.5.exe
SCNS Book CD
tftp.cap
SCNS Book CD
fragment.cap
SCNS Book CD
ping.text
SCNS Book CD
ping.cap
SCNS Book CD
ftp.txt
SCNS Book CD
ftp.cap
SCNS Book CD
Lesson 3
puTTY.exe
SCNS Book CD
ping_arp.mac.cap
SCNS Book CD
rip.update.cap
SCNS Book CD
ripv2withAuthentication.cap
SCNS Book CD
Lesson 5
ISA Server 2006
www.microsoft.com/isaserver/prodinfo/default.mspx
ISAScwHlpPack.exe
SCNS Book CD
Lesson 6
rfc-index.wri
SCNS Book CD
rfc2547.txt
SCNS Book CD
rfc2979.txt
SCNS Book CD
Lesson 8
Snort_2_6_1_2_Installer
SCNS Book CD
Snort Rules
SCNS Book CD
mysql-essential-5.0.27-win32
SCNS Book CD
adodb493a.tgz
SCNS Book CD
base-1.2.7.tar.gz
SCNS Book CD
Lesson 9
WildPackets_OmniPeek_Personal41
www.omnipeek.com/downloads.php
dotnetfx.exe
SCNS Book CD
NetStumbler
SCNS Book CD
Course duration
5 Days
Course outline
Lesson 1: Network Defense Fundamentals
Lesson 2: Advanced TCP/IP
Lesson 3: Routers and Access Control Lists
Lesson 4: Designing Firewalls
Lesson 5: Configuring Firewalls
Lesson 6: Implementing IPSec and VPNs
Lesson 7: Designing an Intrusion Detection System
Lesson 8: Configuring an IDS
Lesson 9: Securing Wireless Networks