Module 1 – Network Defense Management
Network Attacks and Defense Strategies
-
Explain essential terminologies related to network security attacks
-
Describe the various examples of network-level attack techniques
-
Describe the various examples of host-level attack techniques
-
Describe the various examples of application-level attack techniques
-
Describe the various examples of social engineering attack techniques
-
Describe the various examples of email attack techniques
-
Describe the various examples of mobile device-specific attack techniques
-
Describe the various examples of cloud-specific attack techniques
-
Describe the various examples of wireless network-specific attack techniques
-
Describe Attacker’s Hacking Methodologies and Frameworks
-
Understand fundamental goal, benefits, and challenges in network defense
-
Explain Continual/Adaptive security strategy
-
Explain defense-in-depth security strategy
Administrative Network Security
-
Obtain compliance with regulatory frameworks
-
Discuss various Regulatory Frameworks, Laws, and Acts
-
Learn to design and develop security policies
-
Conduct security awareness training
-
Discuss other administrative security measures
Module 2 Network Perimeter Security
Technical Network Security
-
Discuss access control principles, terminologies, and models
-
Redefine Access Control security in Today’s Distributed and Mobile Computing World
-
Discuss Identity and Access Management (IAM) concepts
-
Discuss cryptographic security techniques
-
Discuss various cryptographic algorithms
-
Discuss security benefits of network segmentation techniques
-
Discuss various essential network security solutions
-
Discuss various essential network security protocols
Network Perimeter Security
-
Understand firewall security concerns, capabilities, and limitations
-
Understand different types of firewall technologies and their usage
-
Understand firewall topologies and their usage • Distinguish between hardware, software, host, network, internal, and external firewalls
-
Select firewalls based on its deep traffic inspection capability
-
Discuss firewall implementation and deployment process
-
Discuss recommendations and best practices for secure firewall Implementation and deployment
-
Discuss firewall administration activities • Understand role, capabilities, limitations, and concerns in IDS deployment
-
Discuss IDS/IPS classification • Discuss various components of IDS • Discuss effective deployment of network and host-based IDS
-
Learn to how to deal with false positive and false negative IDS alerts
-
Discuss the selection of appropriate IDS solutions
-
Discuss various NIDS and HIDS Solutions with their intrusion detection capabilities
-
Discuss router and switch security measures, recommendations, and best practices
-
Leverage Zero Trust Model Security using Software-Defined Perimeter (SDP)
Module 3 Endpoint Protection
Endpoint Security – Windows Systems
-
Understand Window OS and Security Concerns
-
Discuss Windows Security Components
-
Discuss Various Windows Security Features
-
Discuss Windows security baseline configurations
-
Discuss Windows User Account and Password Management
-
Discuss Windows Patch Management
-
Discuss User Access Management
-
Discuss Windows OS Security Hardening Techniques
-
Discuss Windows Active Directory Security Best Practices
-
Discuss Windows Network Services and Protocol Security
Endpoint Security – Linux Systems
-
Understand Linux OS and Security Concerns
-
Discuss Linux Installation and Patching
-
Discuss Linux OS Hardening Techniques
-
Discuss Linux User Access and Password Management
-
Discuss Linux Network and Remote Access Security
-
Discuss Various Linux Security Tools and Frameworks
Endpoint Security – Mobile Devices
-
Discuss Common Mobile Usage Policies in Enterprises
-
Discuss the Security Risk and challenges associated with Enterprises mobile usage policies
-
Discuss security guidelines to mitigate risk associated with enterprise mobile usage policies
-
Discuss and implement various enterprise-level mobile security management Solutions
-
Discuss and implement general security guidelines and best practices on Mobile platforms
-
Discuss Security guidelines and tools for Android devices
-
Discuss Security guidelines and tools for iOS devices
Endpoint Security-IoT Devices
-
Understand IoT Devices, their need, and Application Areas
-
Understand IoT Ecosystem and Communication models
-
Understand Security Challenges and risks associated with IoT-enabled environments
-
Discuss the security in IoT-enabled Environments
-
Discuss Security Measures for IoT-enabled Environments
-
Discuss IoT Security Tools and Best Practices
-
Discuss and refer various standards, Initiatives and Efforts for IoT Security
Module 4 – Application and Data Protection
Administrative Application Security
-
Discuss and implement Application Whitelisting and Blacklisting
-
Discuss and implement application Sandboxing
-
Discuss and implement Application Patch Management
-
Discuss and implement Web Application Firewall (WAF)
Data Security
-
Understand Data Security and its Importance
-
Discuss the implementation of data access controls
-
Discuss the implementation of encryption of “Data at rest”
-
Discuss the implementation of Encryption of “Data at transit”
-
Discuss the implementation of Encryption of “Data at transit” between browser and web server
-
Discuss the implementation of Encryption of “Data at transit” between database server and web server
-
Discuss the implementation of Encryption of “Data at transit” in Email Delivery
-
Discuss Data Masking Concepts
-
Discuss data backup and retention
-
Discuss Data Destruction Concepts
-
Data Loss Prevention (DLP) Concepts
Module 5 – Enterprise Virtual, Cloud, and Wireless Network Protection
Enterprise Virtual Network Security
-
Understand Virtualization Essential Concepts
-
Discus Network Virtualization (NV) Security
-
Discuss Software-Defined Network (SDN) Security
-
Discuss Network Function Virtualization (NFV) Security
-
Discus OS Virtualization Security
-
Discuss Security Guidelines, recommendations and best practices for Containers
-
Discuss Security Guidelines, recommendations and best practices for Dockers
-
Discuss Security Guidelines, recommendations and best practices for Kubernetes
Enterprise Cloud Network Security
-
Understand Cloud Computing Fundamentals
-
Understand the Insights of Cloud Security
-
Evaluate CSP for Security before Consuming Cloud Service
-
Discuss security in Amazon Cloud (AWS)
-
Discuss security in Microsoft Azure Cloud
-
Discuss Security in Google Cloud Platform (GCP)
-
Discuss general security best practices and tools for cloud security
Enterprise Wireless Network Security
-
Understand wireless network fundamentals
-
Understand wireless network encryption mechanisms
-
Understand wireless network authentication methods
-
Discuss and implement wireless network security measures
Module 6 – Incident Detection
Network Traffic Monitoring and Analysis
-
Understand the need and advantages of network traffic monitoring
-
Setting up the environment for network monitoring
-
Determine baseline traffic signatures for normal and suspicious network traffic
-
Perform network monitoring and analysis for suspicious traffic using Wireshark
-
Discuss network performance and bandwidth monitoring concepts
Network Logs Monitoring and Analysis
-
Understand logging concepts
-
Discuss log monitoring and analysis on Windows systems
-
Discuss log monitoring and analysis on Linux
-
Discuss log monitoring and analysis on Mac
-
Discuss log monitoring and analysis on Firewall
-
Discuss log monitoring and analysis on Routers
-
Discuss log monitoring and analysis on Web Servers
-
Discuss centralized log monitoring and analysis
Module 7 – Incident Response
Incident Response and Forensic Investigation
-
Understand incident response concept
-
Understand the role of first responder in incident response
-
Discuss Do’s and Don’t in first response
-
Describe incident handling and response process
-
Describe forensics investigation process
Business Continuity and Disaster Recovery
-
Introduction to Business Continuity (BC) and Disaster Recovery (DR)
-
Discuss BC/DR Activities
-
Explain Business Continuity Plan (BCP) and Disaster Recovery Plan (DRP)
-
Discuss various BC/DR Standards
Module 8 – Incident Prediction
Risk Anticipation with Risk Management
-
Understand risk management concepts
-
Learn to manage risk though risk management program
-
Learn different Risk Management Frameworks (RMF)
-
Learn to manage vulnerabilities through vulnerability management program
-
Learn vulnerability assessment and scanning
Threat Assessment with Attack Surface Analysis
-
Understand the attack surface analysis
-
Understand and visualize your attack surface
-
Learn to identify Indicators of Exposures (IoE)
-
Learn to conduct attack simulation
-
Learn to reduce the attack surface
Threat Prediction With Cyber Threat Intelligence
-
Understand the role of cyber threat intelligence in network defense
-
Understand different types of threat Intelligence
-
Understand the Indicators of Threat Intelligence: Indicators of Compromise (IoCs) and Indicators of Attack (IoA)
-
Understand the layers of Threat Intelligence
-
Learn to leverage/consume threat intelligence for proactive defense