Linux Expert+ Security Program

on August 11-15, 2008

Course Fee: 22,500+12%VAT

Duration: 5days; 9am-5pm; M-F

Objective

This course looks at the network security in defensive view. The Linux Security program is designed to provide Expert skills needed to analyze the internal and external security threats against a network, and to develop / design / configure, security systems / appliances / applications that will protect an organization's information.

Students will learn how to evaluate network and Internet security issues and design. In addition, they will learn how to build a security appliance using the Linux OS and GPL Application.

This Course covers following courses:

· EC-Council Linux Security

· Novell SuSE Linux Administration

Course Outline/Agenda

Module1: General Considerations & Definition of Terms

Creating a security concept

Understanding the basics of a security concept

Performing a communication analysis

Analyzing protection requirements

Analyzing the current security situation and necessary enhancements

Module2: Designing Linux box for UTM Appliance

Installation & Configuration of Linux OS for Security Device

Hardening OS & Kernel

Installation for required services

Module3: Linux Networking Fundamentals

Explain the purposes and development of computer networking

Identify common types of networking hardware

Describe how networking software operates

Understand when popular networking protocols are used

Define network routing and describe the purpose of popular routing protocols

Module4: Configuring Basic Linux Networking

Describe how networking devices differ from other Linux devices

Configure Linux networking using scripts and text-mode utilities

Configure Linux networking using popular graphical utilities

Effectively use networking utilities to test a network and troubleshoot networking problems

Module5: Designing Firewalls over Linux

General Firewall Design

Understanding Firewall Concepts and Purpose

Describing firewall components

Packet Filters

Application-Level Gateways

Demilitarized Zone

Understanding Advantages and Disadvantages of firewall configurations

Packet Filters

Application-Level Gateways

Packet Filters

Understanding Packet Filters

Routing

Stateful Packet Filters

Understanding Advanced Firewall Features & Server

Design Firewall Appliance

Design / Configure smart GUI for Firewall Appliance

Understanding Network Address Translation (NAT)

Masquerading

NAT

PAT (Port Address Translation)

Module6: Designing VPN Appliances

Site to Site VPN Appliance

Client to Site VPN Appliance

Discussing

Module7: Setting up Secure Device Administration

Module8: Designing Internet Content Filter

Module9: Configuring Secure DNS Server

Module10: Designing IDS / IPS Appliance

Host Based Intrusion Detection System

Network Based Intrusion Detection System

Placing IDS / IPS to the Network

Module11: Configuring Secure DHCP Server

Module12: Design Vulnerability Scanning Appliance

Module13: Design Secure Email Server

Module14: Setting up secure sFTP Server

Module15: Design Security Audit Appliance

Module16: Security, Ethics and Privacy

List security risks typical in modern networked computer systems

Understand how to assess risk and create a security policy

Describe the function of top security-awareness organizations

Outline the role of the government in security and privacy

Module17: Making Data Secure

Explain commonly used cryptographic systems

Understand digital certificates and certificate authorities

Use the PGP and CPG data-encryption utilities

Describe different ways in which cryptography is applied to make computer systems more secure.

Module18: User Security

Follow good password security practices

Use Common utilities to promote user security

Module19: File Security

Correctly set up special Linux file permissions

Monitor log files to check for suspicious system activity

Automate checks for file integrity and unauthorized modifications

Module20: UTM Appliance deployment in real life scenarios

Positioning UTM Appliances

Deployment of appliance in production network

About the Speaker:

Mr. Islam is something of an expert when it comes to evaluating security products"

said Juniper Networks (2006)

Professional Profile

Almost 10 years of experience in designing networks and IT Security Infrastructure. Extensive knowledge and hands-on experience on Information Security for mission critical environments, Implemented high-end Security Products & Policies based on ISO 17799 & BS 7799 standards for more than 25 enterprises & various Mid-level enterprises all around the world. Awarded as Master of IT by Juniper http://www.masterofit.net in 2006, CEH (Certified Ethical Hacker), ECSA (EC-Certified Security Analyst).


Currently Mr. Islam is serving one of the largest Govt. Ministry of Kuwait as Network Security Consultant / Architect

Mr. Islam did consulting for various products like: Cisco Security Appliances, UTM Appliances (Firewall, IDS, AntiSPAM, Antivirus), Astaro Security Linux Appliances etc., Juniper, Snort / SAM / ACID names of few

ENROLL NOW!

GLOBAL KNOWLEDGE ASSOCIATES INC.

25th flr. Unit no. 2502b West Tower Philippine Stock Exchange, Ortigas Center Pasig City, 1605 Philippines

Tel. No. (632) 683-0969 / 637-3657 Mobile: +63 920-709-8298

Email: sandra@globalknowledgeph.com Email2: sandramedalla@gmail.com

URL: www.gkphilippines.com

--
Network Security Consultant
CEH (Certified Ethical Hacker), ECSA (EC-Security Analyst) , Juniper Networks Master of IT
http://www.masterofit.net/index.php?filter=deck&cid=1

Linux Expert+ Security Program

on August 11-15, 2008

Course Fee: 22,500+12%VAT

Duration: 5days; 9am-5pm; M-F

Objective

This course looks at the network security in defensive view. The Linux Security program is designed to provide Expert skills needed to analyze the internal and external security threats against a network, and to develop / design / configure, security systems / appliances / applications that will protect an organization's information.

Students will learn how to evaluate network and Internet security issues and design. In addition, they will learn how to build a security appliance using the Linux OS and GPL Application.

This Course covers following courses:

· EC-Council Linux Security

· Novell SuSE Linux Administration

Course Outline/Agenda

Module1: General Considerations & Definition of Terms

Creating a security concept

Understanding the basics of a security concept

Performing a communication analysis

Analyzing protection requirements

Analyzing the current security situation and necessary enhancements

Module2: Designing Linux box for UTM Appliance

Installation & Configuration of Linux OS for Security Device

Hardening OS & Kernel

Installation for required services

Module3: Linux Networking Fundamentals

Explain the purposes and development of computer networking

Identify common types of networking hardware

Describe how networking software operates

Understand when popular networking protocols are used

Define network routing and describe the purpose of popular routing protocols

Module4: Configuring Basic Linux Networking

Describe how networking devices differ from other Linux devices

Configure Linux networking using scripts and text-mode utilities

Configure Linux networking using popular graphical utilities

Effectively use networking utilities to test a network and troubleshoot networking problems

Module5: Designing Firewalls over Linux

General Firewall Design

Understanding Firewall Concepts and Purpose

Describing firewall components

Packet Filters

Application-Level Gateways

Demilitarized Zone

Understanding Advantages and Disadvantages of firewall configurations

Packet Filters

Application-Level Gateways

Packet Filters

Understanding Packet Filters

Routing

Stateful Packet Filters

Understanding Advanced Firewall Features & Server

Design Firewall Appliance

Design / Configure smart GUI for Firewall Appliance

Understanding Network Address Translation (NAT)

Masquerading

NAT

PAT (Port Address Translation)

Module6: Designing VPN Appliances

Site to Site VPN Appliance

Client to Site VPN Appliance

Discussing

Module7: Setting up Secure Device Administration

Module8: Designing Internet Content Filter

Module9: Configuring Secure DNS Server

Module10: Designing IDS / IPS Appliance

Host Based Intrusion Detection System

Network Based Intrusion Detection System

Placing IDS / IPS to the Network

Module11: Configuring Secure DHCP Server

Module12: Design Vulnerability Scanning Appliance

Module13: Design Secure Email Server

Module14: Setting up secure sFTP Server

Module15: Design Security Audit Appliance

Module16: Security, Ethics and Privacy

List security risks typical in modern networked computer systems

Understand how to assess risk and create a security policy

Describe the function of top security-awareness organizations

Outline the role of the government in security and privacy

Module17: Making Data Secure

Explain commonly used cryptographic systems

Understand digital certificates and certificate authorities

Use the PGP and CPG data-encryption utilities

Describe different ways in which cryptography is applied to make computer systems more secure.

Module18: User Security

Follow good password security practices

Use Common utilities to promote user security

Module19: File Security

Correctly set up special Linux file permissions

Monitor log files to check for suspicious system activity

Automate checks for file integrity and unauthorized modifications

Module20: UTM Appliance deployment in real life scenarios

Positioning UTM Appliances

Deployment of appliance in production network

About the Speaker:

Mr. Islam is something of an expert when it comes to evaluating security products"

said Juniper Networks (2006)

Professional Profile

Almost 10 years of experience in designing networks and IT Security Infrastructure. Extensive knowledge and hands-on experience on Information Security for mission critical environments, Implemented high-end Security Products & Policies based on ISO 17799 & BS 7799 standards for more than 25 enterprises & various Mid-level enterprises all around the world. Awarded as Master of IT by Juniper http://www.masterofit.net in 2006, CEH (Certified Ethical Hacker), ECSA (EC-Certified Security Analyst).


Currently Mr. Islam is serving one of the largest Govt. Ministry of Kuwait as Network Security Consultant / Architect

Mr. Islam did consulting for various products like: Cisco Security Appliances, UTM Appliances (Firewall, IDS, AntiSPAM, Antivirus), Astaro Security Linux Appliances etc., Juniper, Snort / SAM / ACID names of few

ENROLL NOW!

GLOBAL KNOWLEDGE ASSOCIATES INC.

25th flr. Unit no. 2502b West Tower Philippine Stock Exchange, Ortigas Center Pasig City, 1605 Philippines

Tel. No. (632) 683-0969 / 637-3657 Mobile: +63 920-709-8298

Email: sandra@globalknowledgeph.com Email2: sandramedalla@gmail.com

URL: www.gkphilippines.com

--
Network Security Consultant
CEH (Certified Ethical Hacker), ECSA (EC-Security Analyst) , Juniper Networks Master of IT
http://www.masterofit.net/index.php?filter=deck&cid=1


Wrangling Vacation Time with Colleagues

This article from the Wall Street Journal’s Monday June 30, 2008 edition highlights the fact that because modern day jobs are so intertwined, employees are typically having to sign off their vacation days with one another.

 “Taking a vacation time used ot mean getting the boss’s approval and heading out the door. ..in today’s flat organization where most people work in teams, vacation planning has beome a large group affair.”

Is this something that is happening to your center?