Course : Network/Internet Security - Overview

Network/Internet Security - Overview






INTER
IN-HOUSE
CUSTOM

Seminar in person or remote class

Ref. SRI
  3d - 21h00
Price : Contact us






Teaching objectives
At the end of the training, the participant will be able to:
Be aware of developments in cybercrime and the challenges it poses
Gain proficiency in the security of the cloud, applications, and client workstations
Understand cryptography concepts
Manage IS security monitoring processes

Course schedule

1
Information security and cybercrime

  • Security principles: Defense in depth, cyber risk modeling.
  • Risk management methods (ISO 27005, EBIOS RM).
  • Overview of ISO 2700x standards.
  • Evolution of cybercrime.
  • New threats (APT, spear phishing, watering hole, crypto-jacking, etc.).
  • Security flaws in software.
  • Anatomy of a cyberattack (Kill Chain).
  • The 0day, 0day Exploit, and exploit kit vulnerabilities.

2
Firewall, virtualization and cloud computing

  • Perimeter protection based on firewalls and DMZs.
  • Differences between UTM, enterprise, NG and NG-v2 firewalls.
  • IPS (Intrusion Prevention System) and IPS NG products.
  • Vulnerabilities in virtualization.
  • Risks associated with Cloud Computing according to CESIN, ENISA, and the CSA.
  • CASB solutions to secure data and applications in the cloud.
  • The Cloud Controls Matrix and how to use it to evaluate Cloud providers.

3
Client workstation security

  • Understanding client workstation oriented threats.
  • Anti-virus/anti-spyware software.
  • How to manage security patches on client workstations.
  • Ransomware: preventive and corrective measures.
  • How to make removable devices secure.
  • Vulnerability of browsers and plug-ins.
  • Drive-by download attack.
  • Threats via USB keys (BadUSB, rubber ducky, etc.).

4
Fundamentals of cryptography

  • Cryptographic techniques.
  • Public key and symmetric key algorithms.
  • Simple, salted and keyed (HMAC) hash functions.
  • Public-key infrastructure (PKI).
  • CC certification and ANSSI qualification of cryptographic products.

5
Authentication and qualification of users

  • Biometric authentication and legal aspects.
  • Challenge/response authentication.
  • The different attack techniques (brute force, keylogger, credential stuffing, etc.).
  • Strong multi-factor authentication (MFA).
  • Chip card authentication and X509 client certificate.
  • The HOTP and TOTP standards of OATH.
  • The UAF and U2F standards of the FIDO (Fast ID Online) alliance.

6
Network flow security

  • The SSL crypto API and its upgrades from SSL v2 to TLS v1.3.
  • Attacks on SSL/TLS protocols.
  • Attacks on HTTPS flows.
  • Hardware key confinement, FIPS-140-2 certifications.
  • The IPsec standard, AH and ESP modes, IKE and key management.
  • Overcoming problems between IPSec and NAT.
  • The SSL VPNs. What are the benefits compared to IPSec?
  • Using SSH and OpenSSH for secure remote administration.
  • On-the-fly decryption of flows: Legal aspects.
  • Easily evaluating the security of an HTTPS server.

7
Wi-Fi security

  • Specific Wi-Fi attacks.
  • How to detect Rogue APs.
  • Terminal security mechanisms.
  • KRACK attack on WPA and WPA2.
  • Description of the risks.
  • The IEEE 802.11i security standard.
  • What WPA3 adds and the DragonBlood vulnerabilities.
  • User and terminal authentication.
  • WiFi authentication within the company.
  • Auditing tools, free software, aircrack-ng, Netstumbler, WiFiScanner, etc.

8
Smartphone security

  • Threats and attacks on mobile devices.
  • iOS and Android: strengths and weaknesses.
  • Viruses and malicious code on mobile phones.
  • MDM and EMM solutions for fleet management.

9
Application security

  • Applying the principle of defense in depth.
  • Web and mobile apps: What security differences are there?
  • Main risks according to OWASP.
  • Focus on XSS, CSRF, SQL injection, and session hijacking attacks.
  • Main methods of secure development.
  • What security clauses are there in development contracts?
  • The application firewall or WAF.
  • How to assess an application's level of security.

10
Management and active supervision of security

  • Safety audits (scope and frameworks: ISO 27001, GDPR, etc.).
  • Intrusion tests (black box, gray box and white box).
  • How to effectively respond to attacks.
  • Setting up an SIEM solution.
  • Should you implement or outsource your Security Operation Center (SOC)?
  • SOC 2.0 technologies (CASB, UEBA, Deceptive Security, EDR, SOAR, machine learning, etc.).
  • ANSSI labels (PASSI, PDIS & PRIS) for outsourcing.
  • Incident response procedures (ISO 27035 and NIST SP 800-61 R2).
  • Bug Bounty platforms.


Customer reviews
4,3 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations
Select your location or opt for the remote class then choose your date.
Remote class