PND comes with life-time access to course material and flexible access to the world's best virtual labs on Network Security.
Enroll now and get access to all of our material and labs!
Plans and Pricing
In this module, you will learn the basics of information security, including the ‘why’ and a lot of the associated vocabulary.
How TCP works is a very important concept to understand. This module covers the OSI/TCP models, the connections themselves and how you can explore live connections yourself with Wireshark.
As Sun Tzu said, “know your enemy”. This module explains some of the attack vectors you will be dealing with when it comes to defending your network. This module concludes in a full scenario of a company’s network being compromised.
In this module, you will learn the majority of the network security appliances in use today.
One of the most important fundamental topics when it comes to securing a network is the design and topology of the network. This module will teach you the considerations and strategies used when planning for a secure network.
When it comes to the perimeter or network segmentation, the firewall is an integral technology. In this module, you will look at configuring a firewall appliance from start to finish with focus on the ACL. This module also covers some of the Next Generation Firewall features such as application identification, IPS and web filtering.
Some of today’s firewalls and other network security appliances are including advanced features to allow you to secure your network even more. This module will show you some of these features to help you control, identify and prevent threats.
The first module introduced you to secure network design and this module will expand upon that topic. You will learn more on network segmentation at both the layer 3 and layer 2 levels.
Providing secure remote access is becoming a very common requirement these days whether it is a site to site tunnel or remote access for your mobile workforce. This module will teach you what you need to know about both as well as walk you through practical examples of deploying them.
Switches are often overlooked in the security plan but can provide additional security at layer two. This module will look at setting up a switch, hardening the device itself and setting up many layer 2 security layers.
This module introduces you to some of the core topics with regard to system security. It covers the basics of the technologies and strategies in involved in every endpoint protection plan.
The foundation for any Windows network is Active Directory. It takes care of your access control, manage users and groups, and set policies to control and harden your Windows domain-joined computers/servers via Group Policy. Finally, we will cover Active Directory Certificate Services and how to set it up correctly so you can implement a PKI.
As you will learn in this course and may already know, patch management is essential to keeping your systems safe. This module will teach you how to setup and manage Windows Server Update Services so you can control and monitor the Windows patch levels in your environment.
Vulnerabilities and exploits are growing exponentially. Signature-based IDS/IPS is the most efficient method to prevent attacks so you will learn about Microsoft EMET which makes a successful exploit much more “expensive” for the attacker. This program also helps to keep your network safer in the zero-day window when no patch is available for a given program or operating system.
This first Active Directory module provided an introduction to Group Policy. In this module, we will take a look at several more Group Policy examples to show you some ways you can secure your Windows endpoints
The first module introduced many of the endpoint security topics. This module will take a deeper dive into endpoint security and some of the specific things you should consider in your strategy. You will also see a couple attacks and see practical mitigations for preventing them.
Printers are usually overlooked yet sensitive information is usually sent to the printer via print or fax capabilities. In addition, many of today’s printers run on a Linux kernel and are sometimes used as pivot points in attacks. This module will teach you the settings you need to configure to harden every printer on your network.
An important part of any security program is vulnerability management. This module will teach you the steps of a vulnerability management program including port scans, vulnerability scans, reporting and remediation.
Understanding the need to give your vendors secure access to your network while protecting your network from their connection is crucial; many of the attacks over the past few years have stemmed from vendors being compromised and the attackers using the vendor’s remote access to pivot deeper into their target’s network. This module will look at some important things to consider with regard to vendor management and how to secure yourself against unwanted activity.
Each lab is associated with a chapter from the course and will provide you with misconfigured or vulnerable network design. You are expected to find security issues, fix them and verify that the patches applied work.
Each lab comes with a manual that walks you through the steps to take.
|Lab 1||Active Directory-Basic User Management and Group Policy with Active Directory||Network Defense|
|Lab 2||Active Directory Certificate Services-Setting up PKI with A.D. Certificate Services||Network Defense|
|Lab 3||WSUS-Patching Windows with WSUS||Network Defense|
|Lab 4||EMET-Protecting Windows with EMET||System Defense|
|Lab 5||Group Policy||Network Defense|
|Lab 6||Endpoint||Network Defense|
|Lab 7||Vulnerabilites-Business Logic Flaws||Network Defense|
|Lab 8||Remediation-Vulnerability Remediation||Network Defense|
|Lab 9||ACL-Configuring ACLs on Firewalls||Network Defense|
|Lab 10||OpenVPN-Configuring OpenVPN on pfSense||Network Defense|
Schuyler Dorsey is a Systems and Security engineer who works in the I.T. consulting field. He has several years of experience, an M.S. in Information Security & Assurance, and several security certifications under his belt. He routinely performs vulnerability assessments, penetration tests, security auditing and also works on the defensive side and helps clients secure their endpoints & networks.
Enroll now and get access to all of our material and labs!