Part 7. Intrusion Detection Systems (IDS) IDS overview; network IDS configuration; IDS deployment and management; intrusion prevention systems and IDS response. Part 8. Security Auditing; Vulnerability Assessment Methods and Tools Vulnerability assessment process and methodologies; review of common tools available; audit methods and reporting. Part 9. Incident Response and Forensic Incident types; incident team organization; incident management; forensic process and tools; report to law enforcement organizations. Part 10. Wireless Security and Privacy Fundamentals wireless security principles; 802.11 access and security methods; Wired Equivalent Privacy (WEP) protocol and weaknesses; wireless authentication methods; 802.1x; wireless security auditing; wireless access protection methods. Part 11. Labs · Install and Configure Cisco PIX Firewall (including build
Cisco IOS based network (LAN/WAN), install and configure routers, switches
and PIX) Suggestion: The Lab should be done right after associated training is
completed. |
||