EC-Council CAST - Advanced Network Defense - Slechts 3 dagen

Seven reasons why you should sit your CAST AND course with Firebrand Training

Ontdek Hoe We Je Helpen Om Snel Nieuwe Skills Aan Te Leren

  1. You’ll be CAST AND certified in just 3 days. With us, you’ll be CAST AND trained in record time
  2. Our CAST AND course is all-inclusive. A one-off fee covers all course materials, accommodation and meals. No hidden extras
  3. Pass CAST AND first time or train again for free. This is our guarantee. We're sure you'll pass your CAST AND course first time. But if you don’t, come back within a year, and only pay for accommodation. Everything else is free
  4. You’ll learn more CAST AND. A day with a traditional training provider generally runs from 9am – 5pm, with a nice long break for lunch. With Firebrand Training you’ll get at least 12 hours/day quality learning time, with your instructor
  5. You’ll learn CAST AND faster. Chances are, you’ll have a different learning style to those around you. We combine visual, auditory and tactile styles to deliver the material in a way that ensures you will learn faster and more easily
  6. You’ll be studying CAST AND with the best. We have won the Institute of IT Training’s "Training Company of the Year" a record three times. As well as winning many more awards, we’ve trained and certified 30,000 professionals, and we’re partners with all of the big names in the business
  7. You'll do more than study CAST AND courseware. We use labs, case studies and practice tests to make sure you can apply your new knowledge to the work environment. Our instructors use demonstrations and real-world experience to keep the day interesting and engaging

Denkt u klaar te zijn voor de cursus? Neem een GRATIS oefentest om uw kennis vast te stellen!

Wanneer wilt u deelnemen aan een versnelde opleiding?

Start datum

Eind datum

Status

Locatie

Nu boeken

24/2/2014 (Maandag)

26/2/2014 (Woensdag)

Beëindigde cursus

-

 

30/6/2014 (Maandag)

2/7/2014 (Woensdag)

Wachtlijst

Landelijk

 

11/8/2014 (Maandag)

13/8/2014 (Woensdag)

Beperkte beschikbaarheid

Landelijk

 

22/9/2014 (Maandag)

24/9/2014 (Woensdag)

Open

Landelijk

 

3/11/2014 (Maandag)

5/11/2014 (Woensdag)

Open

Landelijk

 

15/12/2014 (Maandag)

17/12/2014 (Woensdag)

Open

Landelijk

 

We hebben meer dan 30.000 studenten in tien jaar getrained. We hebben ze allemaal gevraagd onze versnelde opleidingen te evalueren. De laatste keer dat we onze resultaten analyseerden, bleek 96.22% ons te beoordelen als ‘boven verwachting’

"Prima cursus, snel en erg goed!"
Raymond vanderAa. - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Great teacher, perfect location. Learned a lot with high speed, it is really a challange. You will need to be well prepared and gain experience before attending."
Marco Tilburg, Query ITechnologies. - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (17/3/2014 t/m 21/3/2014)

"Effectief snel leren, met de nodige humor."
Raymond van der Aa. - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (6/1/2014 t/m 10/1/2014)

"Zeer kundige docenten, mensen die uit het veld komen en weten waar ze over spreken. "
Annoniem, ministerie van Binnenlandse zaken - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"In slechts 5 dagen krijg je alle relevante kennis aangedragen die je nodig hebt voor je certificering. 5 dagen bikkelen heeft zeker resultaat."
Gerwin Aalderink, Rabobank. - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"Fast-paced super focused training is what you really need to quickly gain new skills, or improve on your current skills. Obviously, the quality of the teacher is also imperative and I found the instructor to be an exceptional eacher who manages to cover a lot of material whilst at the same time spicing it up with humor and real-life stories out of his vast professional experience. This really helps to make it stick. I also must mention the fact that the venue is excellent, with very friendly staff and excellent food, even if you have a food allergy or intolerance"
Annoniem, ORBATEC - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (11/11/2013 t/m 15/11/2013)

"Intensieve training van ervaren docent. Veel kennisoverdracht in korte periode. "
Jan Ysebaert, all-project BVBA. - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"Very nice training and had a very nice week, thank you Firebrand!!"
Annoniem - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"The course is very insightful,but at the same time very fun. Although you need some knowledge before hand, to help you along your journey to be certified ethical hacker."
Annoniem - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (9/9/2013 t/m 13/9/2013)

"The logistics, service, accommodation, course material; everything is well organised and complete. Really nice place (in Guldenberg), nice quiet surroundings; Firebrand has chosen a good location for their course. The course itself was fast paced and attention grabbing and gripping (CEH). Entertaining Instructor."
Annoniem - EC-Council Certified Ethical Hacker (CEH v8) (5 Dagen) (8/7/2013 t/m 12/7/2013)

The EC-Council Centre of Advanced Security Training has arrived at Firebrand Training. This three-day Advanced Network Defense course is intensive, and will make you think like a hacker. You will learn how to defend against the latest attacks.

Warning: This is not a beginner’s course. You'll be expected to know how to attempt attacks against many platforms and architectures. The instructor will challenge you to attack a device or system, then you will learn how to defend against it. The course is right for you if you're a: firewall administrator, system architect, or system / Windows administrator.

You will learn:

  • How to identify security weaknesses in computer systems or networks, before it's too late
  • How to use hacking and pen testing to defend against various attacks
  • Best practices in developing secure system and network configurations
  • How to deploy machines in a protected state
  • Techniques critical to the protection of your entire enterprise against some of today’s most advanced threats
  • How to detect malware

Note: this course doesn't include an exam, but you'll become Advanced Network Defense certified.

Accredited Training Centre of the Year

Accredited Training Centre of the Year

Firebrand Training has again won the EC-Council Accredited Training Centre of the Year Award, from a Training Partner network that has more than 450 training centres across 70 countries.

Jay Bavisi, President of EC-Council said: “The annual EC-Council Awards highlights the commitment and achievements of our global partners and trainers that have contributed to the information security community.”

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Module 1: Firewalls

  • Firewalls
  • Firewall Types: Stateless Packet Filters
  • Improving Device Remote-Access Security
  • Locking Down the Console Port
  • Protecting Terminal Lines
  • Establishing Encrypted Communications
  • Configuring HTTPS
  • Configuring SSH

LAB: Securing the Perimeter

Module 2: Advanced Filtering

  • Advanced Filtering Techniques
  • Ingress Filtering
  • Egress Filtering
  • Source Address Verification (SAV)
  • uRPF
  • Additional Filtering Considerations
  • Time-Based ACLs
  • Reflexive ACLs
  • Reflexive ACL vs. Static ACL
  • Context-Based Access Control (CBAC)
  • Essential Steps to Harden Routers

LAB: Advanced Filtering

Module 3: Firewall Configuration

  • Firewall Types: Stateful Packet Filters
  • Application Proxies
  • Application Proxies vs. Stateful Packet filters
  • Web Application Firewalls
  • Web Application Firewall Types
  • Web Application Firewall Products
  • Firewall Architecture
  • Screened Subnet Firewall
  • The Classic Firewall Architecture
  • Belt and Braces Firewall
  • Separate Services Subnet
  • Fortress Mentality
  • De-parameterization
  • Perimeter Configuration

LAB: Selecting a Firewall Architecture

Module 4: Hardening: Establishing a Secure Baseline

  • Windows NT/2000/2003 and XP
  • Windows 2000/2003/XP
  • Windows 2003
  • Windows Vista
  • Server 2003 Architecture
  • Broken Kernel
  • Modes of the OS
  • UNIX/Linux
  • Secure Server Guidelines
  • Hardening Systems
  • Security Compliance Manager
  • Device Security
  • Essential Steps to Harden Switches

LAB: Hardening

Windows Server 2008 Security (Part I)

  • Server 2008 Components
  • Enterprise Protection
  • AD RMS
  • AD RMS Components
  • EFS
  • EFS Enhancements in Server 2008
  • EFS Best Practices

LAB: Server 2008 Lab

Windows Server 2008 Security (Part II)

  • IPsec Rules
  • Firewall Scripting
  • netsh
  • Isolating a Server
  • Group Policy Object
  • Server Isolation Steps
  • Domain Isolation
  • Domain Isolation Issues
  • Best Practices
  • Trusted Platform Module
  • Wave Systems
  • TPM Architecture
  • Crypto API
  • Example
  • Embassy Server Software
  • Embassy Client Software
  • Self-Encrypting Drives

LAB: TPM

Module 5: Intrusion Detection and Prevention

  • Why Intrusion Detection?
  • Fortress Mentality
  • Intrusion Detection 101
  • What is Intrusion Detection?
  • False positives!
  • Topology concerns
  • Recommended in most circles
  • Realistic
  • Intrusion Prevention
  • Types of IPS
  • Host-Based Intrusion Prevention Systems
  • Host-Based Intrusion Prevention Systems

LAB: Intrusion Detection

Module 6: Protecting Web Applications

  • Top 10 www.owasp.org
  • Injection Flaws
  • Cross Site Scripting
  • Broken Authentication
  • Insecure Cryptographic Storage
  • Reverse Engineering Web Apps
  • Tools
  • Hackbar
  • Tamper Data
  • The Two Main Attacks for Web
  • XSS
  • SQL Injection
  • xp_cmdshell
  • There is More
  • More Tools
  • SQL Inject Me
  • XSS ME
  • Choose The Right Database
  • Practice, Practice, Practice
  • Tutorials
  • Mutillidae
  • Web Application Firewalls
  • Components of Web Application Firewall

LAB: Protecting Web Apps

Module 7: Memory Analysis

  • Data Types Revisited
  • Volatile
  • System date and time
  • Current network connections and Open ports
  • Processes that opened ports
  • Cached NetBIOS Names
  • Users Currently Logged On
  • Internal routing
  • Running Processes
  • Pslist
  • Trivia
  • Pslist –t
  • Tasklist
  • Tlist
  • Running Services
  • Open Files
  • Process Memory Dumps

LAB: Memory Analysis

Module 8: Endpoint protection

  • Introduction to NAC
  • NAC Defined
  • NAC General Architecture
  • NAC General Architecture Illustrated
  • NAC Concepts
  • Inline NAC
  • Out-of-Band
  • Identifying NAC Requirements
  • Implementing User-Based Identity Access Control
  • Network Access Protection (NAP)
  • NAP Components
  • NAP Enforcement
  • NAP Best Practices
  • 802.1x
  • EAP Explained
  • LAB 1: Network Access Protection with DHCP
  • LAB 2: Network Access Protection with IPsec
  • LAB 3: Endpoint Protection

Module 9: Securing Wireless

  • Wireless Tools
  • Wireless Vulnerabilities Summary
  • MAC Filtering
  • Hiding Access Points
  • Hijacking
  • Jamming
  • Identifying Targets
  • Wardriving
  • Sniffing on Wireless
  • Attacking Encrypted Networks
  • Wep Data
  • The other case
  • Reality
  • WPA Tools
  • WPA
  • LEAP
  • Asleap
  • Comparison

LAB: Securing Wireless

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Official EC-Council Courseware

  • CAST 614 - Advanced Network Defense

Lees meer ...

Belangstelling? Zie onze prijzen of bel ons op 024-8457770

Warning: This is not a beginner’s course. You'll be expected to know how to attempt attacks against many platforms and architectures. The instructor will challenge you to attack a device or system, then you will learn how to defend against it. The course is right for you if you're a: firewall administrator, system architect, or system / Windows administrator.

You must be familiar with IT security best practices, and have a good understanding of programming logic and common web technologies, as well as binary applications:

  • Basic Windows administration for servers and workstations
  • Basic Linux/NIX system administration skill
  • Basic command line proficiency on both Windows and NIX systems

Ideally, the you'll be EC-Council CEH or ECSA certified - or have the equivalent experience.

Belangstelling? Zie onze prijzen of bel ons op 024-8457770