This course is provided by Wintrac. Wintrac provides one stop shopping for all your IT
training needs. Wintrac’s course catalog of over two thousand courses includes courses on Security Training
Overview
This course is designed to provide the foundation knowledge to network administrators and security professionals who are seeking to learn about advanced security issues surrounding PKI and biometrics. Advanced Security Implementation is designed to provide network administrators and security architects with an awareness of security-related issues and the essential skills they need to implement security in a given network. It is the first course offered in the second level of the Security Certified Program. This course is followed by Enterprise Security Solutions (ESS).
Prerequisites
To ensure your success, you are strongly recommended to first take the following courses or have equivalent knowledge:
- Hardening the Infrastructure
- Network Defense and Countermeasures
Hardware/Software Requirements
- Operating Systems:
- Windows 2000 Server CD-ROM (Server will be installed as a standalone server).
- Drivers for Windows 2000 (including network, video, and audio).
- Service Packs:
- Service Pack 2 for Windows 2000.
- Hardware:
- Two computers per instructor.
- One computer per student.
- One 10/100 switch or hub.
- RSA SecurID Key Fob Tokens.
- BioLinkUSA U-Match USB mouse, one per student. Obtained from BioLinkUSA
at www.biolinkusa.com.
- Panasonic BM-ET100US Authenticam, one per classroom. Obtained from Panasonic
at www.panasonic.com/cctv/products/bmet100us.asp.
- One microphone per student recommended.
- One set of speakers per student is recommended.
- Internet Access:
- Several tasks do require Internet access from student machines.
- May substitute instructor demos if required.
- Computers:
- Pentium III 500 MHz (750 MHz recommended).
- 128 MB of RAM (256 MB recommended).
- 8 GB of hard disk space.
- One 10/100 network card (card that can run in promiscuous mode recommended).
- Audio capabilities.
- RSA SecurID System:
- RSA ACE/Server.
- RSA ACE/Server License.
- RSA ACE/Agent.
- RSA SecurID Key For Hardware Tokens (one Token per Student is recommended).
- RSA SecurID Token Records.
- Tools and Utilities:
- WinZIP—For file management (download from www.winzip.com).
- Acrobat Reader—For file reading (download from www.adobe.com).
- RSA ACE/Server SecurID—Strong Authentication (available at www.rsasecurity.com/go/profile2.asp,
evaluation of this product is available).
- RSA ACE/Agent SecurID—Strong Authentication (available at www.rsasecurity.com/go/profile2.asp,
evaluation of this product is available).
- CrypTool—Cryptography (download from www.cryptool.com).
- EnCase—Forensics (must request Encase Forensics CD from www.guidancesoftware.com/corporate/inforequest/request_demo.shtm).
- Sha_Verify—Forensics (download from www.dmares.com/maresware/freesoftware.htm).
- ThumbsPlus—Forensics (download from www.cerious.com/download.shtml).
- dtSearch—Forensics (download from www.dtsearch.com/download.html).
- WinHEx—Forensics (download from www.winhex.com/winhex/index-m.html).
- Quick View Plus—Forensics (download form to fill out at www.avantstar.com/solutions/quick_view_plus/default.aspx).
- fport—Forensics (download from www.foundstone.com/resources/termsofuse.htm?file=fport.zip).
- JPHS for Windows (Steganography)—Forensics (download from http://linux01.gwdg.de/~alatham/stego.html).
- BioLink Mouse Software—Biometrics (with product from BioLinkUSA).
- Panasonic Iris Software—Biometrics (with product from Panasonic).
- Anovea Voice Software—Biometrics (download from www.anovea.com/www/download.htm).
Performance-Based Objectives
- Describe the fundamentals of trusted networks.
- Describe the concepts and principles of cryptography.
- Implement computer forensic tools.
- Identify current laws and legislation that influence computer security
professionals.
- Describe biometric solutions, including fingerprint scanning, iris
scanning, and vocal scanning.
- Describe strong authentication solutions and implement token-based
strong authentication.
- Describe the function of digital certificates.
- Describe the implementation of digital signatures.
Delivery Method
Instructor-led, group-paced, classroom-delivery learning model with structured, hands-on activities.
Course duration
5 Days
Course outline
Lesson 1: Introduction to Trusted Networks
- Topic 1A: The Need For Trusted Networks
- Topic 1B: Authentication and Identification
- Topic 1C: Public Key Infrastructure
- Topic 1D: Applications of PKI
Lesson 2: Cryptography and Data Security
- Topic 1A: The Need For Trusted Networks
- Topic 2A: History of Cryptography
- Topic 2B: Math and Algorithms
- Topic 2C: Private Key Exchange
- Topic 2D: Public Key Exchange
- Topic 2E: Message Authentication
Lesson 3: Computer Forensics
- Topic 3A: Incident Response
- Topic 3B: Computer Forensic Fundamentals
- Topic 3C: Hard Disk Structure
- Topic 3D: Forensic Tools
- Topic 3E: Investigating Computers
- Topic 3F: Computer Forensics Solutions
Lesson 4: Law and Legislation
- Topic 4A: Intellectual Property
- Topic 4B: Categories and Types of Law
- Topic 4C: Process of Handling Evidence
- Topic 4D: Information Security-related Laws and Acts
Lesson 5: Biometrics—Who You Are
- Topic 5A: The Process of Biometrics Today
- Topic 5B: Accuracy of Biometrics
- Topic 5C: Applications of Biometrics
- Topic 5D: Fingerprint Scanning
- Topic 5E: Facial Scanning
- Topic 5F: Iris and Retinal Scanning
- Topic 5G: Vocal Scanning
- Topic 5H: Further Biometric Technologies
- Topic 5I: Techniques for Compromising Biometrics
Lesson 6: Strong Authentication
- Topic 6A: Why Strong Authentication
- Topic 6B: Authentication Tokens
- Topic 6C: RSA SecurID
- Topic 6D: Smart Cards
Lesson 7: Digital Certificates
- Topic 7A: Paper Certificates and Identity Cards
- Topic 7B: Authorities that Issue Physical Certificates
- Topic 7C: The Importance of Protecting the Identity of
the CA
- Topic 7D: Differences between Physical and Digital Certificates
- Topic 7E: Standards for Digital Certificates
- Topic 7F: X.509 as an Authentication Standard
- Topic 7G: Case Study—VeriSign’s Digital Certificates
Lesson 8: Digital Signatures
- Topic 8A: Signatures as Identifiers
- Topic 8B: Features of Digital Signatures
- Topic 8C: Digital Signatures in Practice
- Topic 8D: Standards for Digital Signatures
- Topic 8E: Digital Signatures and PKI
Appendix A: About FIPS PUB
- Federal Information Processing Standards Publication
Appendix B: PKI-related Acronyms
|