Network Access Control Using the Risk Management Framework

Level: Intermediate

Help your organisation produce a comprehensive security posture by developing generally accepted practises for access control in network security. In this Network Access Control (NAC) training course, you will learn how to perform security breaches with techniques from the FISMA Risk Management Framework, utilise protocol analysers to track live attacks, analyse the effectiveness of network security control devices, and recommend improvements to block attacks. Help your organisation produce a comprehensive security posture by developing generally accepted practises. In this training course, you learn how to perform security breaches with techniques from the FISMA Risk Management Framework, utilise protocol analysers to track live attacks, analyse the effectiveness of security controls, and recommend improvements to block attacks.

Key Features of this Network Access Control Training

  • After-course instructor coaching benefit
  • Learning Tree end-of-course exam included

You Will Learn How To:

  • Protect assets by selecting and managing effective security controls
  • Evaluate the thoroughness and quality of security controls
  • Do more than just "security theater"
  • Provide and monitor a comprehensive, strong defence
  • Integrate accessibility into services and environments

Certifications/Credits:

CompTIA

Choose the Training Solution That Best Fits Your Individual Needs or Organisational Goals

LIVE, INSTRUCTOR-LED

In Class & Live, Online Training

  • 4-day instructor-led training course
  • One-on-one after-course instructor coaching
  • After-course computing sandbox
  • Tuition can be paid later by invoice -OR- at the time of checkout by credit card
View Course Details & Schedule

Standard £2095

RESERVE SEAT

PRODUCT #3674

TRAINING AT YOUR SITE

Team Training

  • Bring this or any training to your organisation
  • Full - scale program development
  • Delivered when, where, and how you want it
  • Blended learning models
  • Tailored content
  • Expert team coaching

Customize Your Team Training Experience

CONTACT US

Save More on Training with Learning Tree Training Vouchers!

Our flexible, easy-to-redeem training vouchers are available to any employee within your organisation. For details, please call 0800 282 353 or chat live.

In Class & Live, Online Training

Note: This course runs for 4 Days *

*Events with the Partial Day Event clock icon run longer than normal but provide the convenience of half-day sessions.

  • 7 - 10 Dec 9:00 AM - 4:30 PM GMT Online (AnyWare) Online (AnyWare) Reserve Your Seat

  • 1 - 4 Mar 9:00 AM - 4:30 PM GMT Online (AnyWare) Online (AnyWare) Reserve Your Seat

  • 7 - 10 Jun 9:00 AM - 4:30 PM BST Online (AnyWare) Online (AnyWare) Reserve Your Seat

  • 31 Aug - 3 Sep 9:00 AM - 4:30 PM BST Online (AnyWare) Online (AnyWare) Reserve Your Seat

Guaranteed to Run

When you see the "Guaranteed to Run" icon next to a course event, you can rest assured that your course event — date, time — will run. Guaranteed.

Partial Day Event

Learning Tree offers a flexible schedule program. If you cannot attend full day sessions, this option consists of four-hour sessions per day instead of the full-day session.

Important Network Access Control Course Information

  • Recommended Experience

    • Previous experience in networking and TCP/IP protocol stack
    • Technical background in networking and security terms

Network Access Control Course Outline

  • Introduction

    • Applying defence in depth: tools, techniques and people
    • Comprehending FISMA and OMB oversight
    • Assimilating Risk Management Framework Security Life Cycle
  • Risk Management Framework

    Multi-tiered risk management

    • Organisation: Strategic risk management
    • Mission/Business: Tactical approach to risk
    • Information Systems

    Defining roles and responsibilities

    • Distinguishing hierarchy and key roles of risk management
    • Defining responsibilities assigned to specific roles
    • Separating roles and areas of responsibility

    Phases of risk management

    • Categorising information systems
    • Selecting security controls
    • Implementing security controls
    • Assessing security controls
    • Authorising information systems
    • Monitoring security controls
  • Information Assurance

    Introducing information assurance

    • Assuring security throughout the data life cycle
    • Integrating information assurance into software development
    • Building in "secure by design"
    • Implementing information assurance best practises
    • Ensuring component security

    Penetration testing and vulnerability assessments

    • Validating security functions and configuration
    • Finding weaknesses within systems before the attacker does

    Keeping current with information assurance

    • Full disclosure vs. responsible disclosure
    • Exploring vulnerability databases
  • Information Systems and Network Security

    Modularization (the OSI 7 Layer Model)

    • Networking principles powering the Internet
    • Modelling a packet

    Confidentiality, integrity and availability across the network

    • Encrypting for confidentiality
    • Sniffing the network and protocol analysis
    • Modifying data via man-in-the-middle attacks

    Networking services and security

    • Poisoning the DNS cache
    • Incorporating core services including DHCP, ICMP, and ARP
    • Hardening the TCP/IP stack
  • Authentication and Access Control

    Authenticating users

    • Managing factors of authentication (something you know, have or are)
    • Attacking passwords
    • Comprehending PKI and public key authentication systems
    • Evaluating the suitability of biometrics
    • Integrating multi-factor authentication

    Authenticating hosts

    • Incorporating ARP, DHCP, DNS and protocol insecurities
    • Performing and detecting MAC and IP address spoofing
    • Achieving strong host authentication
    • Analysing Kerberos and IPSec
  • Cryptography

    Encrypting and exercising integrity functions

    • Capitalising on asymmetric or Public Key cryptography
    • Applying symmetric cryptography
    • Exercising message digest functions for integrity

    Certificates and Certification Authorities

    • Clarifying PKI and certificate fields
    • Publishing certificate revocation and certificate security

    Digital signatures

    • Digitally signing for strong authentication
    • Proving authentication, integrity and non-repudiation
  • Accessibility

    • Promoting open data policies
    • Removing barriers to enhance accessibility for people
    • Enabling IT accessibility

Team Training

Network Access Control Training FAQs

  • How can I bring this course to my facility to teach my team Network Access Control?

    Enhance your team's effectiveness and boost productivity with instructor-led training delivered privately to your organisation, live online, or to any preferred location!

    Learn more about Private Team Training ›

     

Questions about which training is right for you?

call 0800 282 353
chat Live Chat




100% Satisfaction Guaranteed

Your Training Comes with a 100% Satisfaction Guarantee!*

*Partner-delivered courses may have different terms that apply. Ask for details.

Online (AnyWare)
Online (AnyWare)
Online (AnyWare)
Online (AnyWare)
Preferred method of contact:

Please Choose a Language

Canada - English

Canada - Français