Course : System and Network Security, Level 2

System and Network Security, Level 2






INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class

Ref. SEA
  4d - 28h00
Price : Contact us






Teaching objectives
At the end of the training, the participant will be able to:
Measuring the information system's security level
Using intrusion detection, vulnerability detection, and auditing tools
Strengthening information system security.
How an AAA (Authentication, Authorization, Accounting) architecture works.
Implementing SSL/TLS.

Practical details
Hands-on work
Many tools will be deployed by the participants. IDS SNORT detector, vulnerability scan with NESSUS, network analysis and scan with ETHEREAL and NMAP. Making a Wi-Fi network secure.

Course schedule

1
Refreshers.

  • The TCP/IP protocol.
  • Address translation.
  • Network architecture.
  • Firewall: Benefits and limits.
  • Proxys, reverse-proxy: Application protection.
  • Demilitarized zones (DMZ).

2
Attack tools

  • Attack classification and security paradigms.
  • Principles of attacks: Spoofing, flooding, injection, capture, etc.
  • Libraries: Libnet, Libpcap, Winpcap, Libbpf, Nasl, lua.
  • Tools: Scapy, Hping, Ettercap, Metasploit, Dsnif, Arpspoof, Smurf.
Hands-on work
Analyzing protocols with Wireshark. Using Scapy and Arpspoof.

3
Cryptography, application

  • Security services.
  • Cryptographic algorithms and principles (DES, 3DES, AES, RC4, RSA, DSA, ECC).
  • Specific certificates and profiles for various servers and clients (X509).
  • IPSEC protocol and virtual private networks (VPN).
  • SSL/TLS and VPN-SSL protocols. Data compression issues.
Hands-on work
Getting started with openssl and implementing OpenPGP. Generating X509 v3 certificates.

4
AAA architecture (Authentication, Authorization, Accounting).

  • The AAA network: Authentication, authorization, and accounting.
  • One Time Password: OTP, HOTP, Google Authenticator, SSO (Kerberos protocol).
  • The role of the LDAP directory in authentication solutions.
  • The modules PAM and SASL.
  • Radius architecture and protocol (Authentication, Authorization, Accounting).
  • Possible attacks.
  • How to protect yourself.
Hands-on work
Attacking an AAA server.

5
Detecting intrusions

  • Operating principles and detection methods.
  • Market players, overview of systems and applications involved.
  • Network scanners (Nmap) and application scanners (Web applications).
  • IDSs (Intrusion Detection Systems).
  • The benefits of these technologies and their limits.
  • How to place them in the enterprise architecture.
  • Overview of the market, detailed study of SNORT.
Hands-on work
Installation, configuration, and implementation of SNORT, writing attack signatures.

6
Verifying a system's integrity

  • Operating principles.
  • What are the products available?
  • Overview of Tripwire or AIDE (Advanced Intrusion Detection Environment).
  • Vulnerability auditing.
  • Principles and methods and organizations for managing vulnerabilities.
  • Reference site and overview of auditing tools.
  • Defining a security policy.
  • Study and implementation of Nessus (status, operation, evolution).
Hands-on work
Vulnerability auditing of the network and servers using Nessus and Nmap. Website vulnerability auditing.

7
Managing security events

  • Handling information reported by various security equipment.
  • Consolidation and correlation.
  • Overview of SIM (Security Information Management).
  • SNMP management and protocol: Security strengths and weaknesses.
  • SNMP security solution.
Hands-on work
Setting up a SNMP attack.

8
Wi-Fi network security

  • How do you make a WiFi network secure?
  • Intrinsic weaknesses of WiFi networks.
  • SSID Broadcasting, MAC Filtering: What do they add?
  • Is WEP still useful?
  • The WPA protocol, the first acceptable solution.
  • WPA implementation in shared key mode, is it enough?
  • WPA, Radius and AAA server, enterprise implementation.
  • The 802.11i and WPA2 standards: Which solution is the most advanced today?
  • Injecting traffic, cracking WiFi keys.
Hands-on work
Configuring tools for traffic capture, scanning networks and analyzing Wi-Fi traffic. Configuring an AP (access point) and implementing security solutions.

9
Telephony-over-IP security

  • Voice-over-IP concepts. Overview of applications.
  • Architecture of a VoIP system.
  • The SIP protocol, an open voice-over-IP standard.
  • Weaknesses of the SIP protocol.
  • Problems with NAT.
  • Attacks on telephony-over-IP.
  • What are the security solutions?

10
Email security

  • Architecture and operation of email.
  • Protocols and access to emails (POP, IMAP, Webmail, SMTP, etc.).
  • Problems and classifications of email attacks (spam, phishing, identity theft, etc.).
  • Spam fighters.
  • Methods, architectures, and tools for fighting spam.
  • Email address collection tools.
  • Solutions implemented against spam.


Customer reviews
4,1 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations

From 3 to 6 June 2025
FR
Remote class
Registration
From 17 to 20 June 2025 *
FR
Remote class
Registration
From 15 to 18 July 2025
FR
Remote class
Registration
From 26 to 29 August 2025
FR
Remote class
Registration
From 16 to 19 September 2025 *
FR
Remote class
Registration
From 7 to 10 October 2025
FR
Remote class
Registration
From 18 to 21 November 2025 *
FR
Remote class
Registration
From 16 to 19 December 2025
FR
Remote class
Registration