network security by quontra solutions
DESCRIPTION
Quontra Solutions instructor-led CCNA hands-on training and certification Assistance boot camp in United States. Packed with updated topics that have been added to the latest version of the CCNA exam, this updated course features expanded coverage of key topic areas plus new material on IP data networks, LAN switching technologies, IP addressing (IPv4/IPv6), IP routing technologies, IP services, network device security, troubleshooting, and WAN technologies. Call us to get your career a New Light… Please Visit us for the Demo Classes, we have regular batches and weekend batches. Other Courses we offered: DATABASE: SQL/PL-SQL MICROSOFT: ADO .NET, ASP .NET, C# .NET, MSBI, SharePoint, Vb .NET PROGRAMMING: Core Java, Advanced Java, J2EE, Hibernates, Strutus, Java Scripting, Perl Scripting, Shell Scripting, Springs, Ruby on Rails Mobile Apps: Android, IOS Training, Cloud Computing, Networking, Unix Admin, Linux, Sun Solaris, Testing Tools: Manual Testing, QTP, Selenium Selenium: SalesForce Developer, SalesForce Administrator BUSINESS ANALYST, HADOOP Quontra Solutions Email: [email protected] Call: US: +1 404-900-9988. UK: (20)3734 1498.TRANSCRIPT
www.quontrasolutions.com Call us : (404)-900-9988
QUONTRA SOLUTIONS
http://www.quontrasolutions.com
Call us : (404)-900-9988
Network Security
Network Security
Security DevicesFirewallsNetwork Access SecurityUser AuthenticationDevice SecurityCommon Security Threats
www.quontrasolutions.com Call us : (404)-900-9988
Security DevicesExplain the function Of Hardware and
Software security devices.
Network Based Firewall Host Based FirewallIDS IPSVPN Concentrator
www.quontrasolutions.com Call us : (404)-900-9988
Host Based FirewallSoftware Based Protection on a
deviceSees all the TrafficDifficult to manage
large groups
www.quontrasolutions.com Call us : (404)-900-9988
Windows Firewall with Advanced [email protected]
www.quontrasolutions.com Call us : (404)-900-9988
Network Based FirewallFilters Traffic By Port NumberCan Encrypt traffic in/out of the network.Can proxy trafficMost firewalls can be Layer 3 devices
(routers).
www.quontrasolutions.com Call us : (404)-900-9988
Network Based FirewallAdvantages
Protects many devices at onceHigh-speed
DisadvantagesLimited Visibility into encrypted Information
www.quontrasolutions.com Call us : (404)-900-9988
IDS/IPSIntrusion Detection SystemIntrusion Prevention System
IntrusionsExploits against Operating Systems , applications
etc.Bufferoverflows and other vulnerabilities
Detection Vs PreventionDetection – Alarm or AlertPrevention – Stop it before it gets into the network.
www.quontrasolutions.com Call us : (404)-900-9988
IDS/IPSAdvantages
Watches all traffic through a network linkCan completely stop bad traffic
DisadvantagesLimited Visibility into encrypted DataYet Another device on the Network
www.quontrasolutions.com Call us : (404)-900-9988
VPN concentrator
www.quontrasolutions.com Call us : (404)-900-9988
Identify Common Security Threats and Mitigations
Security ThreatsDos ,viruses, worms ,attackers ,Man in
the middle attack ,Smurf ,Social engineering (phishing)
Mitigation TechniquesPolicies and Procedures ,user
training ,patch and updates
www.quontrasolutions.com Call us : (404)-900-9988
Denial Of ServiceAnything that prevents a device from providing
normal services
DoS /DDoS Denial Of Service /Distributed Denial of service
Smurf AttacksPing sents to a broadcast address were
duplicated to all IP addresses on the subnets by the routers We fixed that in 1999
www.quontrasolutions.com Call us : (404)-900-9988
Viruses and WormsViruses infect files and duplicate by
copying themselves with other documents
Worms don’t need any other files or programs in order to infect other devices
Malware is a catch-all term for viruses ,spywares , adwares ,worms and other bad stuff
www.quontrasolutions.com Call us : (404)-900-9988
Man in the Middle AttackA form of electronic eavesdropping
Especially useful for encrypted communication
www.quontrasolutions.com Call us : (404)-900-9988
Man in the Middle AttackA form of electronic eavesdropping
Especially useful for encrypted communication
www.quontrasolutions.com Call us : (404)-900-9988
Social EngineeringMajor Threats
Electronically UndetectableSuspicious Telephone Call
Don’t give any information over the Telephone
Look out for unattended personsBadgesProcesses
www.quontrasolutions.com Call us : (404)-900-9988
Phishing Electronic Version Of Social Engineering
www.quontrasolutions.com Call us : (404)-900-9988
Mitigation Techniques
Policies and Procedures
User Training
Patches and Updates
www.quontrasolutions.com Call us : (404)-900-9988
SummaryDoS (Denial Of Service) or DDoS
(Distributed DoS) prevent a device from providing normal services.
Man in the Middle Attack method can hackers use to intercept encrypted communication between stations
Phishing is the electronic method of social engineering to gather personal information.
www.quontrasolutions.com Call us : (404)-900-9988
www.quontrasolutions.com Call us : (404)-900-9988
TO KNOW MORE IN-DEPTH KNOWLEDGE CONTACT US
Call : (404)-900-9988
Email: [email protected]
http://www.quontrasolutions.com
QUONTRA SOLUTIONS