Advanced Security Implementation
Course Specifications
Course number: 079540
Course length: 5
Software: PBC N/A
Course Description
This course is designed to provide the foundation knowledge to network
administrators and security professionals who are seeking to learn about advanced
security issues surrounding PKI and biometrics. Advanced Security Implementation
is designed to provide network administrators and security architects with
an awareness of security-related issues and the essential skills they need
to implement security in a given network. It is the first course offered in
the second level of the Security Certified Program. This course is followed
by Enterprise Security Solutions (ESS).
Prerequisites: To ensure your success, you are strongly recommended to first take the
following Element K courses or have equivalent knowledge:
- Hardening the Infrastructure
- Network Defense and Countermeasures
Delivery Method: Instructor-led, group-paced, classroom-delivery learning model
with structured, hands-on activities.
Hardware/Software Requirements
You will need:
- Operating Systems:
- Windows 2000 Server CD-ROM (Server will be installed as a standalone server).
- Drivers for Windows 2000 (including network, video, and audio).
- Service Packs:
- Service Pack 2 for Windows 2000.
- Hardware:
- Two computers per instructor.
- One computer per student.
- One 10/100 switch or hub.
- RSA SecurID Key Fob Tokens.
- BioLinkUSA U-Match USB mouse, one per student. Obtained from BioLinkUSA
at www.biolinkusa.com.
- Panasonic BM-ET100US Authenticam, one per classroom. Obtained from Panasonic
at www.panasonic.com/cctv/products/bmet100us.asp.
- One microphone per student recommended.
- One set of speakers per student is recommended.
- Internet Access:
- Several tasks do require Internet access from student machines.
- May substitute instructor demos if required.
- Computers:
- Pentium III 500 MHz (750 MHz recommended).
- 128 MB of RAM (256 MB recommended).
- 8 GB of hard disk space.
- One 10/100 network card (card that can run in promiscuous mode recommended).
- Audio capabilities.
- RSA SecurID System:
- RSA ACE/Server.
- RSA ACE/Server License.
- RSA ACE/Agent.
- RSA SecurID Key For Hardware Tokens (one Token per Student is recommended).
- RSA SecurID Token Records.
- Tools and Utilities:
- WinZIP—For file management (download from www.winzip.com).
- Acrobat Reader—For file reading (download from www.adobe.com).
- RSA ACE/Server SecurID—Strong Authentication (available at www.rsasecurity.com/go/profile2.asp,
evaluation of this product is available).
- RSA ACE/Agent SecurID—Strong Authentication (available at www.rsasecurity.com/go/profile2.asp,
evaluation of this product is available).
- CrypTool—Cryptography (download from www.cryptool.com).
- EnCase—Forensics (must request Encase Forensics CD from www.guidancesoftware.com/corporate/inforequest/request_demo.shtm).
- Sha_Verify—Forensics (download from www.dmares.com/maresware/freesoftware.htm).
- ThumbsPlus—Forensics (download from www.cerious.com/download.shtml).
- dtSearch—Forensics (download from www.dtsearch.com/download.html).
- WinHEx—Forensics (download from www.winhex.com/winhex/index-m.html).
- Quick View Plus—Forensics (download form to fill out at www.avantstar.com/solutions/quick_view_plus/default.aspx).
- fport—Forensics (download from www.foundstone.com/resources/termsofuse.htm?file=fport.zip).
- JPHS for Windows (Steganography)—Forensics (download from http://linux01.gwdg.de/~alatham/stego.html).
- BioLink Mouse Software—Biometrics (with product from BioLinkUSA).
- Panasonic Iris Software—Biometrics (with product from Panasonic).
- Anovea Voice Software—Biometrics (download from www.anovea.com/www/download.htm).
Performance-Based Objectives
- Describe the fundamentals of trusted networks.
- Describe the concepts and principles of cryptography.
- Implement computer forensic tools.
- Identify current laws and legislation that influence computer security
professionals.
- Describe biometric solutions, including fingerprint scanning, iris
scanning, and vocal scanning.
- Describe strong authentication solutions and implement token-based
strong authentication.
- Describe the function of digital certificates.
- Describe the implementation of digital signatures.
Course Content
- Lesson 1: Introduction to Trusted Networks
- Topic 1A: The Need For Trusted Networks
- Topic 1B: Authentication and Identification
- Topic 1C: Public Key Infrastructure
- Topic 1D: Applications of PKI
- Lesson 2: Cryptography and Data Security
- Topic 2A: History of Cryptography
- Topic 2B: Math and Algorithms
- Topic 2C: Private Key Exchange
- Topic 2D: Public Key Exchange
- Topic 2E: Message Authentication
- Lesson 3: Computer Forensics
- Topic 3A: Incident Response
- Topic 3B: Computer Forensic Fundamentals
- Topic 3C: Hard Disk Structure
- Topic 3D: Forensic Tools
- Topic 3E: Investigating Computers
- Topic 3F: Computer Forensics Solutions
- Lesson 4: Law and Legislation
- Topic 4A: Intellectual Property
- Topic 4B: Categories and Types of Law
- Topic 4C: Process of Handling Evidence
- Topic 4D: Information Security-related Laws and Acts
- Lesson 5: Biometrics—Who You Are
- Topic 5A: The Process of Biometrics Today
- Topic 5B: Accuracy of Biometrics
- Topic 5C: Applications of Biometrics
- Topic 5D: Fingerprint Scanning
- Topic 5E: Facial Scanning
- Topic 5F: Iris and Retinal Scanning
- Topic 5G: Vocal Scanning
- Topic 5H: Further Biometric Technologies
- Topic 5I: Techniques for Compromising Biometrics
- Lesson 6: Strong Authentication
- Topic 6A: Why Strong Authentication
- Topic 6B: Authentication Tokens
- Topic 6C: RSA SecurID
- Topic 6D: Smart Cards
- Lesson 7: Digital Certificates
- Topic 7A: Paper Certificates and Identity Cards
- Topic 7B: Authorities that Issue Physical Certificates
- Topic 7C: The Importance of Protecting the Identity of
the CA
- Topic 7D: Differences between Physical and Digital Certificates
- Topic 7E: Standards for Digital Certificates
- Topic 7F: X.509 as an Authentication Standard
- Topic 7G: Case Study—VeriSign’s Digital Certificates
- Lesson 8: Digital Signatures
- Topic 8A: Signatures as Identifiers
- Topic 8B: Features of Digital Signatures
- Topic 8C: Digital Signatures in Practice
- Topic 8D: Standards for Digital Signatures
- Topic 8E: Digital Signatures and PKI
- Appendix A: About FIPS PUB
- Federal Information Processing Standards Publication
- Appendix B: PKI-related Acronyms
- PKI-related Acronyms