Font size:

This course looks at the network security in defensive view. The ENSA program is designed to provide fundamental skills needed to analyze the internal and external security threats against a network, and to develop security policies that will protect an organization’s information. Students will learn how to evaluate network and Internet security issues and design, and how to implement successful security policies and firewall strategies. In addition, they will learn how to expose system and network vulnerabilities and defend against them. This course prepares you for EC-Council Network Security Administrator exam 312-38. This course is a prerequisite for the CEH program.

Fundamentals of the Network

  • Key Elements of a Network
  • The Network Backbone
  • Sharing of Data
  • Modem
  • Router
Network Protocols
  • Common Protocol Numbers
  • Internet Protocol (IP)
  • Network Classes
  • Multicasting Protocols
Protocol Analysis
  • Windowing
  • IP Datagram
  • Hop By Hop Option
Hardening Physical Security
  • Dumpster Diving
  • Office Security
  • Man-Made Threats
  • Smart Cards
  • Locks and Keys
  • Mantrap
Network Security
  • Goals of Network Security
  • Security Awareness
  • System Manager and System Staff
Security Policy
  • Classification Systems
  • Security Framework
  • Implementation
IEEE Standards
  • Wireless Networking Standards
  • Wi-MAX
Network Security Threats
  • Types of Attacks
  • Classification of Hackers
  • Types of Scanning
  • Types of Sniffing
  • Logic Bomb
  • Man in the Middle Attack
  • Session Hijacking
  • Network Scanning Tools
  • Netstat Tool
Intrusion Detection System (IDS) and Intrusion Prevention System (IPS)
  • Intrusion Detection Concept
  • Characteristics of IDS
  • Identifying the Importance of IDS
  • Understanding the Types of IDS
  • NIDS Architecture
  • IDS and IPS
  • Security Features
  • Firewall Operations
  • Software Firewall
  • Hardware Firewall
  • Dual Homed Host
  • Limitations of Firewalls
  • Firewall Log Analysis
Packet Filtering and Proxy Server
  • Application Layer Gateway
  • Network Address Translation
  • Packet Sequencing
  • Signature Analysis
  • Transmission Control Protocol (TCP)
  • User Datagram Protocol (UDP)
Bastion Host and Honeypots
  • Building Honeypots
  • Mantrap
  • Building a Honeynet
Troubleshooting Network
  • Troubleshooting Strategy
  • Solving the Problem
  • Bad NICs
  • DNS Errors
  • Using Ping
Hardening Router
  • Introduction to Routers
  • Types of Routes
  • Routing Principles
  • Hardening a Router
  • Passwords and Secrets
  • Setting Session Timeout Periods
Hardening Operating System
  • BIOS Security
  • Windows Registry
  • Process
  • Windows Infrastructure Features
  • IPSecurity
Patch Management
  • Introduction to Patch Management
  • Change Management Rules
  • Patch Testing
  • Implementing the Windows Update Services
Application Security
  • Importance of Application Security
  • Application Threats
  • Cookies
  • Countermeasures to Threats
  • Best Practices for Secure Coding
Web Security
  • Common Threats on Web
  • Identity Theft
  • Email Security Risks: Spam
  • Input Data Validation
Email Security
  • Types of Email
  • Components of Email
  • Analyzing the Core Elements of Email Encryption
  • Secure Email
  • Tracking Emails
Authentication: Encryption, Cryptography and Digital Signatures
  • Encryption Systems
  • Hashing Algorithm: HMAC
  • Performing RSA Encryption and Decryption
  • SSL
  • Cryptography
  • Math and Algorithm
  • Virtual Private Network
    • Types of VPN
    • Tunneling
    • VPN Tunneling Protocols
    • Insecure Storage of Authentication Credentials by VPN Clients
  • Wireless Network Security
    • Introduction to Wireless Networks
    • Wireless Network Types
    • Antennas
    • Wireless Router
    • Bluetooth
    Creating Fault Tolerance
    • Planning for Fault Tolerance
    • Network Security
    • Fault Tolerant Network
    • Simple Server Redundancy
    • Privacy
    Incident Response
    • Category of Incidents
    • Types of Incidents
    • Six Step Approach for Incident Handling
    • Proactive Services
    • Security Quality Management Services
    Disaster Recovery and Planning
    • Overview of Disaster and Types
    • Principles of Disaster Recovery
    • Backup Sites
    • Security Planning
    • Disaster Recovery Testing
    • Risk Analysis
    • Risk Management
    Network Vulnerability Assessment
    • Goals of Vulnerability Assessment
    • Vulnerability Classes
    • Network Vulnerability Assessment Methodology
    • How to Detect Vulnerability
  • Register Now
    Network Security Administrator ENSA Training with Official EC-Council Courseware Online course
    • Course ID:
    • Duration:
      12 months
    • Price: