Network security by quontra solutions

Preview:

DESCRIPTION

Quontra Solutions instructor-led CCNA hands-on training and certification Assistance boot camp in United States. Packed with updated topics that have been added to the latest version of the CCNA exam, this updated course features expanded coverage of key topic areas plus new material on IP data networks, LAN switching technologies, IP addressing (IPv4/IPv6), IP routing technologies, IP services, network device security, troubleshooting, and WAN technologies. Call us to get your career a New Light… Please Visit us for the Demo Classes, we have regular batches and weekend batches. Other Courses we offered: DATABASE: SQL/PL-SQL MICROSOFT: ADO .NET, ASP .NET, C# .NET, MSBI, SharePoint, Vb .NET PROGRAMMING: Core Java, Advanced Java, J2EE, Hibernates, Strutus, Java Scripting, Perl Scripting, Shell Scripting, Springs, Ruby on Rails Mobile Apps: Android, IOS Training, Cloud Computing, Networking, Unix Admin, Linux, Sun Solaris, Testing Tools: Manual Testing, QTP, Selenium Selenium: SalesForce Developer, SalesForce Administrator BUSINESS ANALYST, HADOOP Quontra Solutions Email: info@quontrasolutions.com Call: US: +1 404-900-9988. UK: (20)3734 1498.

Citation preview

info@quontrasolutions.com

www.quontrasolutions.com Call us : (404)-900-9988

QUONTRA SOLUTIONS

http://www.quontrasolutions.com

Call us : (404)-900-9988

Network Security

Network Security

Security DevicesFirewallsNetwork Access SecurityUser AuthenticationDevice SecurityCommon Security Threats

info@quontrasolutions.com

www.quontrasolutions.com Call us : (404)-900-9988

Security DevicesExplain the function Of Hardware and

Software security devices.

Network Based Firewall Host Based FirewallIDS IPSVPN Concentrator

info@quontrasolutions.com

www.quontrasolutions.com Call us : (404)-900-9988

Host Based FirewallSoftware Based Protection on a

deviceSees all the TrafficDifficult to manage

large groups

info@quontrasolutions.com

www.quontrasolutions.com Call us : (404)-900-9988

Windows Firewall with Advanced Securityinfo@quontrasolutions.com

www.quontrasolutions.com Call us : (404)-900-9988

Network Based FirewallFilters Traffic By Port NumberCan Encrypt traffic in/out of the network.Can proxy trafficMost firewalls can be Layer 3 devices

(routers).

info@quontrasolutions.com

www.quontrasolutions.com Call us : (404)-900-9988

Network Based FirewallAdvantages

Protects many devices at onceHigh-speed

DisadvantagesLimited Visibility into encrypted Information

info@quontrasolutions.com

www.quontrasolutions.com Call us : (404)-900-9988

IDS/IPSIntrusion Detection SystemIntrusion Prevention System

IntrusionsExploits against Operating Systems , applications

etc.Bufferoverflows and other vulnerabilities

Detection Vs PreventionDetection – Alarm or AlertPrevention – Stop it before it gets into the network.

www.quontrasolutions.com Call us : (404)-900-9988

IDS/IPSAdvantages

Watches all traffic through a network linkCan completely stop bad traffic

DisadvantagesLimited Visibility into encrypted DataYet Another device on the Network

www.quontrasolutions.com Call us : (404)-900-9988

VPN concentrator

www.quontrasolutions.com Call us : (404)-900-9988

Identify Common Security Threats and Mitigations

Security ThreatsDos ,viruses, worms ,attackers ,Man in

the middle attack ,Smurf ,Social engineering (phishing)

Mitigation TechniquesPolicies and Procedures ,user

training ,patch and updates

www.quontrasolutions.com Call us : (404)-900-9988

Denial Of ServiceAnything that prevents a device from providing

normal services

DoS /DDoS Denial Of Service /Distributed Denial of service

Smurf AttacksPing sents to a broadcast address were

duplicated to all IP addresses on the subnets by the routers We fixed that in 1999

www.quontrasolutions.com Call us : (404)-900-9988

Viruses and WormsViruses infect files and duplicate by

copying themselves with other documents

Worms don’t need any other files or programs in order to infect other devices

Malware is a catch-all term for viruses ,spywares , adwares ,worms and other bad stuff

www.quontrasolutions.com Call us : (404)-900-9988

Man in the Middle AttackA form of electronic eavesdropping

Especially useful for encrypted communication

www.quontrasolutions.com Call us : (404)-900-9988

Man in the Middle AttackA form of electronic eavesdropping

Especially useful for encrypted communication

www.quontrasolutions.com Call us : (404)-900-9988

Social EngineeringMajor Threats

Electronically UndetectableSuspicious Telephone Call

Don’t give any information over the Telephone

Look out for unattended personsBadgesProcesses

www.quontrasolutions.com Call us : (404)-900-9988

Phishing Electronic Version Of Social Engineering

www.quontrasolutions.com Call us : (404)-900-9988

Mitigation Techniques

Policies and Procedures

User Training

Patches and Updates

www.quontrasolutions.com Call us : (404)-900-9988

SummaryDoS (Denial Of Service) or DDoS

(Distributed DoS) prevent a device from providing normal services.

Man in the Middle Attack method can hackers use to intercept encrypted communication between stations

Phishing is the electronic method of social engineering to gather personal information.

www.quontrasolutions.com Call us : (404)-900-9988

info@quontrasolutions.com

www.quontrasolutions.com Call us : (404)-900-9988

TO KNOW MORE IN-DEPTH KNOWLEDGE CONTACT US

Call : (404)-900-9988

 Email: info@quontrasolutions.com

http://www.quontrasolutions.com

QUONTRA SOLUTIONS