Security Essentials Framework (SEF)

This framework has been developed to make strong fundamentals of security; it covers most required topics to deliver routine security tasks.

Objective

  • To develop strong conceptual understanding of protocols
  • To develop strong conceptual understanding of security terms
  • To develop hack proofing with Windows and Unix Systems
  • To develop conceptual and practical firewall and intrusion detection skills
  • To get familiarity with penetration testing skills
  • To get familiarity with forensic skills
  • To develop password cracking and management skills
  • To provide strong familiarity with important security tools/techniques

Goal

  • To develop strong fundamentals of security
  • To teach all important functions of important tools/products.

Target Audience

This framework is designed for those who are just beginning their journey in information technology security. It�s a starting point from where one can build his base, which includes:
  • Students Interested to learn information security
  • Network / System and Web application administrator
  • IT Staff responsible for information security
This framework, which focuses on security more from a technical perspective, addresses cutting edge most required topics.

Table of Contents

 
Introduction
  • Target Audience
  • What this Framework Covers
  • Conventions used
  • Lab Overview
  • Step-by-step configuration of your systems
  • Brief Introduction to Security
  • Security Policy
  • Introduction to Security Tools
How protocol works?
  • HTTP, FTP, SMTP, DNS, SNMP
  • TCP
  • IP
  • ARP/RARP, STP
IP Addressing and Subnetting
  • Binary Translation
  • Subnetting
Getting familiarity with sniffers
  • tcpdump
  • ethereal
Hack Proofing Windows System
  • System Security
    • Hardening System
    • Secure Implementation
    • Patch Management
  • Hfnetchk
  • IISLockdown
  • MPSA
  • Backups
  • Auditing System
Hack Proofing Linux System
  • Understanding Unix file System
  • Understanding Unix Permissions
  • System Security
    • Hardening System
    • Secure Implementation
    • Patch Management
  • Unix Network Commands
  • Backup
  • tar utility
  • Auditing
Understanding Virus, Worm and Trojans
  • Trust Relationships
  • Fun with Sub7
  • How Slammer, Blaster worm works?
Firewalls
  • Understanding NAT, PAT and Proxing
  • Understanding various architectures of Firewalls
  • Statefull Firewall: CheckPoint NG
  • Application Gateway: Microsoft ISA
  • Statefull Firewall: Cisco Secure IOS Firewall
  • Statefull Firewall: iptables
  • Host Based Firewall: Zone Alarm
Intrusion Detection Systems
  • Understanding various architectures of IDS
  • Sniffing with tcpdump and ethereal
  • Network based Intrusion Detection System � Snort
  • Network based Intrusion Detection System � ISS Real Secure
  • Host based Intrusion Detection System � xinetd
  • Host based Intrusion Detection System � Swatch
  • Host based Intrusion Detection and Prevention System � PortSentry
Vulnerability Scanning
  • Understanding various types of scanning
  • Scanning with hping2
  • Scanning with Nmap
  • Scanning with Nessus
  • Scanning with Amap
Penetration Testing
  • Overview
  • Understanding Methodology
    • Information Gathering
    • Network Mapping
    • Vulnerability Identification
    • Penetration
    • Gaining Access & Privilege Escalation
    • Enumerate Further
    • Maintaining Access
    • Covering The Tracks
    • Reporting
    • Clean up and Destroy Artifacts
  • Playing with Exploits
Password Cracking
  • Understanding Password cracking
  • John the Ripper
  • Lepton Crack
  • L0pht Crack (LC4)
Forensic Backups
  • Using Ghost for disk imaging
  • Using dd for forensic analysis
Denial of Service and Distributed Denial of Service Attacks
  • Understanding type of Denial of Service Attacks
  • Understanding type of Distributed Denial of Service Attacks
Web Application Security
  • Understanding Web Attacks
  • Experiment with Web Sleuth
  • Finding bugs using Nikto
Communication Security
  • PGP
  • Steganography with JPHS
  • Steganography with S-Tools

你可能感兴趣的:(Security,framework,休闲,Essentials,(SEF))