“Fundamentals of network security” - course 100,000 rubles. from MSU, training 16 weeks. (4 months), Date: November 27, 2023.
Miscellaneous / / November 27, 2023
Purpose of the program
After listening to the course and successfully passing the exam, students will
Know
Concepts and definitions related to information security, basic symmetric and asymmetric algorithms encryption, cryptographic hash functions and message authentication methods, basic concepts of open source infrastructure key; principles of creating a secure IT infrastructure, basic technologies for application and network tunneling levels, classification of firewalls, classification of detection and prevention systems penetrations.
Be able to
Use various security mechanisms and services in tunneling protocols, create policies for firewalls and intrusion detection systems.
Own
Methodology for creating security policies, firewall policies and intrusion detection systems.
Form of study
Correspondence courses using distance learning technologies
Scope of the program (academic hours)
Total - 288
Classroom - 144
Admission Requirements
Network administrators who want to learn the network security concepts needed to deploy and configure virtual private networks.
Formal learning outcomes
The course involves the study of methodological and algorithmic foundations, standards, as well as information technology security mechanisms and services. Considerable attention is paid to the study of the most important services and information security mechanisms, cryptographic algorithms and protocols, and information security problems on the Internet. In particular, the main symmetric encryption algorithms are considered: DES, 3DES, IDEA, GOST 28147, Blowfish, Rijndael, as well as modes of their use; public key encryption algorithms RSA, Diffie-Hellman and DSS are considered, the principles of public key distribution, the X.509 standard of the third version and principles are considered creation of a public key infrastructure, the most widely used application-level network security protocols and the protocol for creating virtual private networks.
Technologies of firewalls and intrusion detection systems are considered. The focus is on gaining practical skills in creating a secure network infrastructure, in particular deploying and configuring firewalls.
The most widely used network security protocols at the application, network and data link levels are considered. The focus is on gaining the practical skills needed to deploy and configure virtual private networks.
The course “Basics of Network Security” was developed jointly with D-Link.
Practical training is conducted using D-Link DFL 860E firewalls, which have a FSTEC certificate.
To carry out laboratory work, the following equipment is required for 1 workplace:
- 3 computers, one of which is connected to the dmz interface of the firewall and on which the web server is installed, the remaining two are connected to the LAN interface of the firewall;
- 1 firewall DFL-860E;
- Ethernet cables.
Additionally:
- 1 computer acts as a server on which a domain controller (AD server) and a RADIUS server are installed.
1 Basic principles for creating a reliable and secure IT infrastructure
2 Segmentation of networks at the data link level
3 Firewall technologies
4 Cryptographic security mechanisms
5 Tunneling technologies
6 Authentication and storage of accounts
7 Intrusion Detection and Prevention Systems (IDPS)
8 Traffic prioritization and creation of alternative routes
List of laboratory works
1 Basic principles for creating a reliable and secure IT infrastructure.
Firewall administration basics.
Access control between two local networks using a firewall.
2 Segmentation of networks at the data link level.
Subnet segmentation using managed switches. Segmentation of subnets based on port-based VLAN.
3 Firewall technologies.
Create a stateless policy. Create policies for traditional (or outbound) NAT. Creating policies for bidirectional (Two-Way) NAT using the pinholing method.
5.1 GRE protocol.
5.2 Link layer protocols.
Connecting two local networks using the L2TP protocol, authentication using a shared secret
5.3 IPSec protocol family.
Connection of two IPSec local networks in tunnel mode, authentication using a shared secret. Using authentication using the XAuth standard. Using NAT in IPSec. Using the DPD protocol in the IPSec protocol. Methods of participant authentication and key distribution.
5.4 Sharing of L2TP and IPSec, GRE and IPSec protocols.
Connecting two local networks using the GRE/IPSec protocol in transport mode. Connecting two local networks using the L2TP/IPSec protocol in transport mode. Connecting two local networks using the L2TP/IPSec protocol in transport mode; NAT is used for one of the local networks.
6 Authentication and storage of accounts.
RADIUS protocol. Using a RADIUS server to store accounts. LDAP protocol.
Using an LDAP/MS AD server to store accounts. Authenticating access to resources using a browser
7 Intrusion Detection and Prevention Systems (IDPS).
Antivirus scanning. Intrusion detection and prevention.
8 Traffic prioritization and creation of alternative routes.
Creating alternative routes using static routing. Limiting traffic bandwidth. Limiting P2P traffic bandwidth using IDP.