NORTH AMERICA EMEA ASIA
All programs BankAudit 2013 InfoSec World Conference & Expo 2013 SuperStrategies Conference & Expo 2013 The Conference on Big Data Security
All programs The Audit Directors & Managers Symposium The MIS Audit Leadership Institute The MIS CAE Master's Program
 
     Conferences            >      Seminars            >      Symposia            >      Webinars      Online Self Study      Training Weeks      In-House Training      Certificate Programs>      Exhibiting Info      Ways to Save      Request Info      Event Downloads      White Papers      Call for Instructors      Contact MIS      Site Map
Internal Audit IT Audit Info Security
Internal Audit IT Audit Info Security
Network Security Essentials - ASG203 
A Comprehensive Introduction to Network Control Points and Associated Safeguards
Learning Level: Intermediate
CPEs: 24 Fee: $2,150.00
Focus and Features Who Should Attend Agenda Register
Agenda

 What You Will Learn
1. Defining the Distributed Information Technology Environment
- defining a network
- network terminology
- computing models: centralized and distributed
- shared data networks
- distributed computing: client/server, peer-to-peer, middleware
- major risks to network security
- defining the scope of network security and audit programs
- locating network security control points

2. Developing a Reference Framework for Network Security and Audit: Network Standards and Protocols
- protocol defined
- network communications standards and rules for communications
- categorizing network protocols: media access, internetworking/transport, and application/end-user services
- protocol stacks: frameworks for networking
-- Open Systems Interconnection (OSI) Reference Model
--Transmission Control Protocol/Internet Protocol (TCP/IP)
- network addresses: physical/media access, logical numeric and domain names
- TCP/IP application ports: foundation for all network security and audit risk analysis

3. Demystifying Network Media Access Technologies: Local Area Networks (LANs) and Wide Area Networks (WANs)
- geographical network delineation: PAN, LAN, CAN, MAN, WAN
- untangling the ‘Nets: Internet, intranets, and extranets
- common network transmission media: twisted pair copper wire, fiber optics, wireless 
- physical LAN topologies: bus, ring, star, tree
- logical LAN topologies: Ethernet, FDDI
- WAN and Internet connections: analog dial-up, leased lines, residential broadband
- switched WAN network services: Frame Relay, ATM, MPLS
- surveying wireless technologies, risks, and safeguards: personal area, local area, wide area
- security and audit considerations for wired and wireless media access connections

4. Network Interconnection Devices: Functionality, Management, and Security
- positioning network devices in the OSI Reference Model: btidges, switches, routers, wireless access points
- network domains and segmentation
- network device maintenance/management port access security
- Simple Network Management Protocol (SNMP)
- enterprise authentication systems: TACACS+, RADIUS, Diameter
- best practices for network interconnection device security and audit

5. Enterprise Network Directory Services Security and Audit
- overview of critical network directory services
- Lightweight Directory Access Protocol (LDAP) directories
- Domain Name System (DNS)
- securing and auditing directory services

6. Keeping a Lid on Network Host Services Security
- common server and workstation vulnerabilities and risks
- TCP/IP applications and associated risks
- host and network-based tools for locating and assessing active network services security
- developing a 3-layer TCP/IP application risk analysis and management methodology
- detection and protection of network file sharing
- remote control program do’s and don’ts
- averting the perils of networked printers, print servers, and multi-function office devices

7. Circling the Wagons: Network Perimeter Security
- hacker intrusion objectives
- network security strategies
- legal warning banners
- network demilitarized zone (DMZ) architectures and key control points
- network firewalls and proxy servers: policies, architectures
- intrusion detection/prevention systems
- remote user authentication credentials
- network encryption and virtual private networks (VPNs)
- reducing the risks in using Software as a Service (SAAS)/cloud computing
- best practices for network perimeter security and audit

8. Wrap-up: Performing a Network Security Risk Analysis
- identifying the network assets and control points
- categorizing the threats and associated risks
- vulnerability management: identifying, tracking, and closing serious network exposures
- defining “perfect” network security
- a practical strategy for information security
- 12-point plan for success


 
REGISTRATION QUESTIONS?
For questions about your registration, government and team discounts, or multiple registrations, please call Linda Ronconi at (508) 879-7999, ext. 501 or e-mail mis@misti.com.

IN-HOUSE SEMINARS
This seminar is available in-house. For more information about bringing this or other MIS seminars to your organization, please call Mimi Hatch at (410) 692-2465 or e-mail mhatch@misti.com.

 



Dates/Locations
April 22 - 24, 2013
Boston
June 10 - 12, 2013
New York
September 18 - 20, 2013
San Francisco
December 9 - 11, 2013
Washington