CAST Advanced Network Defense 614

ECC Advanced Network Defense (CAST 614) will cover fundamental areas of fortifying your defenses; you will discover methods of developing a secure baseline and how to “harden” your enterprise architectures from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of “live” memory analysis and real time monitoring. 

Virtual Training or e-Learning?

We offer flexibility. You can choose from our selection of in-class courses as well as online courses.

Try a live virtual course

Target Group

This is definitely not a beginner’s course. Participants will be expected to possess the knowledge of attempting attacks against a variety of platforms and architectures under the supervision of an expert. Ideally, the student will be CEH, ECSA or hold equivalent industry experience

  • Windows admin
  • System architects
  • System administrators
  • Firewall administrators
Target Group

Features

  • Staging a strong defense against popular security threats
  • Fortifying your organization with a good foundation of risk protection methods
  • Applying latest references and guidance on best practices in the field of cyber security
  • Securing your enterprise architecture from a medium threat level and building towards more sophisticated threats

Benefits

  • Executing a set of techniques that are critical to the protection of your entire enterprise against some of today’s most advanced threats
  • Reviewing methods of system deployments in as secure a state as possible while supporting your daily business requirements
  • Staging Advanced Attacks to appreciate methods of correctly eliminating or mitigating risk to an acceptable level
  • Applying necessary techniques required for malware identification throughout the enterprise even in the case of the malware not being detectable by any of your security controls
Benefits

Advanced Network Defense

CAST was created to address the need for quality advanced technical training for information security professionals who aspire to acquire the skill sets required for their job functions.

Why CAST 614

CAST 614 will cover fundamental areas of fortifying your defenses by discovering methods of developing a secure baseline and how to harden your enterprise architecture from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of live memory analysis and real time monitoring.

Why CAST 614

Agenda

Day 1
Hide agenda
Open agenda

09:00 – 10:30

Firewalls

  • Firewall Types: Stateless Packet Filters
  • Improving Device Remote-Access Security

10:30 – 10:45

Coffee break

10:45 – 12:15

  • Locking Down the Console Port
  • Protecting Terminal Lines
  • Establishing Encrypted Communications
  • Configuring HTTPS
  • Configuring SSH

12:15 – 13:15

Lunch

13:15 – 14:45

Advanced Filtering

  • Advanced Filtering Techniques
  • Ingress Filtering
  • Egress Filtering
  • Source Address Verification (SAV )
  • uRPF
  • Additional Filtering Considerations

14:45 – 15:00

Coffee break

15:00 – 17:00

  • Time-Based ACLs
  • Reflexive ACLs
  • Reflexive ACL vs. Static ACL
  • Context-Based Access Control (CBAC)
  • Essential Steps to Harden Routers

Day 2
Hide agenda
Open agenda

09:00 – 10:30

Firewall Configuration

  • Advanced Filtering Techniques
  • Firewall Types: Stateful Packet Filters
  • Application Proxies
  • Application Proxies vs. Stateful Packet filters
  • Web Application Firewalls
  • Web Application Firewall Types
  • Web Application Firewall Products
  • Firewall Architecture
  • Screened Subnet Firewall

10:30 – 10:45

Coffee break

10:45 – 12:15

  • The Classic Firewall Architecture
  • Belt and Braces Firewall
  • Separate Services Subnet
  • Fortress Mentality
  • De-parameterization
  • Perimeter Configuration

12:15 – 13:15

Lunch

13:15 – 14:45

Hardening: Establishing a Secure Baseline

  • Windows NT/2000/2003 and XP
  • Windows 2000/2003/XP
  • Windows 2003
  • Windows Vista
  • Server 2003 Architecture
  • Broken Kernel
  • Modes of the OS
  • UNIX/Linux

14:45 – 15:00

Coffee break

15:00 – 17:00

  • Secure Server Guidelines
  • Hardening Systems
  • Security Compliance Manager
  • Device Security
  • Essential Steps to Harden Switches

The program that immerses you into the mysterious world of the “hacker”, providing insights of their mindset; a critical weapon for defending against some of the most malicious attacks around.

  • Block duration 90 minutes
  • Hours 16 hours
  • Refreshments Ano
  • Exam Ano
  • Prerequisites

    2 certification exams

Exam Format

  • 4 hours
  • Multiple choice
  • 100 questions written
  • 10 questions practical
  • Minimum Passing Score: Varies around 800-850 out of 1000
Exam Format

Graduate ratings

Excellent review from 143 reviewers

What makes our references exceptional? They are not one-off events. Clients come back to us regularly.

  • Vladimír Ž.
  • 17.04.20
  • Státní správa zeměměřictví a katastru

Nehodnotím reakci školitele na dotazy, protože dotazy účastníků nebyly. Přestože se jednalo o on-line kurz, tak jej hodnotím velmi pozitivně, a jako velmi účelně vynaložený čas. Na průběhu kurzu se podepisovala kvalita připojení jednotlivých účastníků, ale to nelze ovlivnit organizátorem kurzu. Lektor byl fundovaný, z výkladu bylo zřejmé, že není jen teoretik, ale má v dané problematice praktickou zkušenost. Výklad byl srozumitelný a věcný.

  • Jan V.
  • 21.10.19
  • Univerzita Karlova

Kurz je velmi intenzivní.

View the full list of reference clients.

Your rating
*****

Not sure if this is the right courese for you? Get in touch!

For assistance please give us a call.

We are available at +420 222 553 101 Always Monday to Friday: 9am - 5pm.

*items marked with an asterisk are mandatory

Would you like a gift for your birtday?