Focused upon the best and most successful Open Source projects currently available and using step-by-step hands on methodology, learn how to leverage the benefits of Open Source.
|From Date||To Date||Location||Status||Action|
|For more information on our Securing A Network with Open Source Tools email us at firstname.lastname@example.org.|
Focused upon the best and most successful Open Source projects currently available and using step-by-step hands on methodology, students will learn how to leverage the benefits of Open Source. This course is designed for Network Administrators and anyone responsible for network security, information technology budgeting, or anyone interested in using Open Source tools within their network.
This course features security pillars no network should be without. It begins with a secure and powerful firewall implementation featuring enterprise class capabilities typically costing thousands of dollars from leading commercial vendors. Secondly, an accurate network intrusion detection sensor makes false positives a distant memory with the added benefit of instant notification. Iron clad security benefits of a Proxy server, layered with web content filtering and anti-virus scanning are also covered. Much improved email gateway security through the use of MTA coupled with anti-virus scanning thus eliminating typical MS Exchange attack surface. And, an SSL based VPN implementation with the proven security of Public Key Infrastructure by way of SSL client certificates and two-factor software token authentication. Students are immersed in a VMWare virtual network. Through live demonstrations, class discussions and hands-on labs, students are introduced to Open Source and taught how to install, configure and implement Open Source tools to secure a typical Windows network.
Students will harden a network consisting of:
Final Hacking Attack Exercise:
Students will be challenged with a hacking attack exercise whereby a number of unknown automated attacks will occur against select virtual hosts. Students will be given limited time to apply appropriate configuration changes against virtual hosts to detect and notify of attacks. Upon completion of the exercise Students will be asked to identify attack targets and the purpose of each attack event.