|
Information Security Training
from the Henderson Group |
This page is: |
Quick Links: HOME PAGE CONTACT US INFOSEC TRAINING
NEWSLETTERS AND USER GROUPS ARTICLES
ABOUT US OTHER INFO SOURCES |
You will learn:
For more information on seminar dates and locations, and how to register, please
click here:
Please note that you can save money by holding these classes in-house. Call
Stu at (301) 229-7187 for details.
Note also the classes we offer for Information Security Training, as
listed on the left under QUICK LINKS.
|
"Stu makes the difficult easy to understand and learn. Learning
security became enjoyable." --- William Casement, AT&T
"The session format was very relaxed and informal. A great way to learn a
difficult subject." |
Table of Contents and Class Outline: HG72: How to Audit TCP/IP I Keywords and Concepts A. Introduction B. What TCP/IP is and How Does It Work C. How TCP/IP Security Works D. Security Risks with TCP/IP 1) Copying, alteration, etc. of Data 2) Denial of Service 3) Spoofing by Hijacking a Session 4) Spoofing by Learning Names and Passwords 5) Hijacking a Domain Name 6) Seizing Control of a Port 7) Port Scanning E. Security Protections with TCP/IP 1) Firewalls 2) Encryption and Secured Channels 3) Controlling the Programs 4) Controlling the Ports 5) Intrusion Detection 6) Security Software F. How to Evaluate TCP/IP Security on Any Computer G. Control Objectives H. The Audit Program II Action Plan A. Scoping, Planning, and Basic Data-Gathering B. Identification of TCP/IP Security C. Evaluation of How the Security Pieces Fit Together D. Wrap-up, Working Papers, Follow-up III Forms and Reference A. Basic Security Model B. Forms to Document TCP/IP Network Configuration C. Audit Plan D. Model Documents E. Layout of Important TCP/IP Data Elements 1) IP Datagram 2) TCP Packet 3) IP Addresses and Subnets 4) The OSI Reference Model 5) Some Well Known Port Numbers F. Firewalls INDEX