CellStream, Inc. - Telecom Consulting and Training!
2-Day Instructor Led Hands On Lab Class
Having a good knowledge of Network Security in Wireless and TCP/IP networks is extremely important for anyone in the service provider business. Knowledge and skills with regards to network security are vital to IP network backbone engineers, support engineers/technicians, engineers that test these networks and equipment that is installed in these networks, as well as development engineers.
The course is a combination of knowledge training, systems analysis, with hands-on exercises using Linux based systems, designed by CellStream consultants to bring the technician/engineer, who knows a little about Security, to a deeper understanding of the terms, the tools, and the security issues. A combination of knowledge training, hands-on exercises, and hands-on experience reveals Network Security in a swift, detailed, and understandable way.
The objectives of the course are to:
- Develop a "hands-on" skill set targeted at TCP/IP and Wi-Fi Security in the following key areas:
- Security vuknerabilities and attack methods
- Possible mitigations
- Understand security terminology
- Understand what hackers do and how they do it
- Improve customer satisfaction by sharing the knowledge and skills to mitigate security risks
- Deepen networking knowledge and understanding
These objectives are met by covering the necessary technical bases in a straight forward manner, by keep the content in context of the objectives - connecting the dots. Utilizing a short, subject specific architecture with exercises to drive home key points and Hands-On experience that reveal these points builds skills and knowledge based on Bloom's Taxonomy. Presentation is industry current and up-to-date using a technology specialists.
The target audience for this course is anyone in the telecommunications field that requires a solid and complete understanding of the fundamental operations of the TCP/IP protocol suite in networking, and desires hands-on skills that can be applied to their job function. Ideal candidates are:
- Central Office Technicians, Engineers, and Supervisors
- Line Technicians, and Customer Service Technicians
- Operations individuals that will provide IP configuration and support services
- Development Engineers that must know TCP/IP networking in order to provide hardware and software solutions
- Network Design Engineers that need to understand TCP/IP services and applications
- Network Management individuals that are providing element and network management tools
- Network Administrators and IT professionals
- Technical sales individuals that must be able to correlate features with functionality
- Technical marketing individuals that want more than just a basic understanding of IP
- Certification Track individuals that need to expand their knowledge and studies
All students must attend with a lap-top computer in order to interface to the Security Lab. If the course is held at a classroom where computers are available, the Lap-top computer will not be required.
Students will be provided with a Course Student Guide and a Lab Guide. Also, a lab system for configuration and labs will be provided.
Some students have found that our approach to mastering Security provides needed skills towards acquiring further industry certifications.
The course outline is as follows:
- Part 1: The Groundwork
- Overview and Introductions
- Introduction/Logistics/Time Frames/Course Plan
- Accessing the Online School content
- LAB: Setting up for the CellStream Security Lab
- Part 2: Introduction to Security
- Security Terminology
- Types of Hackers
- Group Exercise: Where are vulnerabilities in an IP Network?
- Phases in Hacking
- Attack Types and Vectors
- Confidentiality, Integrity, Availability
- Malware, Malware Mitigation, Examples
- Part 3: Personal Security
- Personal Awareness
- Default Username/Passwords
- Personal Security – Social Engineering
- Part 4: Security Appliances
- Firewalls, Types, Functionality, Rules Examples
- Instrucion Detection Systems
- Penetration Detection Systems
- Part 5: Scanning, Attacks and Tools
- Scanning Using ARP - demo
- Scanning with nmap - demo
- Local Network Scan mitigation
- MAC Filtering - bypass demo
- Part 6: Layer 2 and Layer 3 Mitigation
- Layer 2 Mitigation: Overview of PPPoE, why Layer 2
- Layer 3 Mitigation: IPSec for VPN Security
- Overview of IPSec
- AH and ESP Protocols and Message Exchange
- Cryptographic Algorithms
- Tunnel and Transport Modes
- IKE – Internet Key Exchange
- LAB Exercise/Demonstration: IPsec Network View and Packet examination
- Encryption Defined
- Diffie-Helman Encryption example
- Part 7: Layer 5 Mitigation with SSH and HTTPS
- How Does SSH Work?
- Symmetrical and Asymmetrical Encryption
- SSH Process, Authentication
- LAB Exercise/Demonstration: SSH Session Walkthrough and Packet Analysis
- HTTPS Defined
- TLS Version Comparison
- SSL Certificates
- LAB Exercise/Demonstration: HTTPS Process and Decryption Process
- Part 8: Other Security Tools
- Scapy packet manipulator - LAB Exercise/Demonstration
- Hping 3 - LAB Exercise/Demonstration
- ARP Spoofing - LAB Exercise/Demonstration
- Wireless Security - LAB Exercise/Demonstration
- Group Exercise: How can we mitigate security vulnerabilities in an IP Network?