Course : System and Network Security, Level 2

System and Network Security, Level 2






INTER
IN-HOUSE
CUSTOM

Practical course in person or remote class
Available in English on request

Ref. SEA
  4d - 28h00
Price : 2850 CHF E.T.






Teaching objectives
At the end of the training, the participant will be able to:
Measuring the information system's security level
Using intrusion detection, vulnerability detection, and auditing tools
Strengthening information system security.
How an AAA (Authentication, Authorization, Accounting) architecture works.
Implementing SSL/TLS.

Practical details
Hands-on work
Many tools will be deployed by the participants. IDS SNORT detector, vulnerability scan with NESSUS, network analysis and scan with ETHEREAL and NMAP. Making a Wi-Fi network secure.

Course schedule

1
Refreshers.

  • The TCP/IP protocol.
  • Address translation.
  • Network architecture.
  • Firewall: Benefits and limits.
  • Proxys, reverse-proxy: Application protection.
  • Demilitarized zones (DMZ).

2
Attack tools

  • Attack classification and security paradigms.
  • Principles of attacks: Spoofing, flooding, injection, capture, etc.
  • Libraries: Libnet, Libpcap, Winpcap, Libbpf, Nasl, lua.
  • Tools: Scapy, Hping, Ettercap, Metasploit, Dsnif, Arpspoof, Smurf.
Hands-on work
Analyzing protocols with Wireshark. Using Scapy and Arpspoof.

3
Cryptography, application

  • Security services.
  • Cryptographic algorithms and principles (DES, 3DES, AES, RC4, RSA, DSA, ECC).
  • Specific certificates and profiles for various servers and clients (X509).
  • IPSEC protocol and virtual private networks (VPN).
  • SSL/TLS and VPN-SSL protocols. Data compression issues.
Hands-on work
Getting started with openssl and implementing OpenPGP. Generating X509 v3 certificates.

4
AAA architecture (Authentication, Authorization, Accounting).

  • The AAA network: Authentication, authorization, and accounting.
  • One Time Password: OTP, HOTP, Google Authenticator, SSO (Kerberos protocol).
  • The role of the LDAP directory in authentication solutions.
  • The modules PAM and SASL.
  • Radius architecture and protocol (Authentication, Authorization, Accounting).
  • Possible attacks.
  • How to protect yourself.
Hands-on work
Attacking an AAA server.

5
Detecting intrusions

  • Operating principles and detection methods.
  • Market players, overview of systems and applications involved.
  • Network scanners (Nmap) and application scanners (Web applications).
  • IDSs (Intrusion Detection Systems).
  • The benefits of these technologies and their limits.
  • How to place them in the enterprise architecture.
  • Overview of the market, detailed study of SNORT.
Hands-on work
Installation, configuration, and implementation of SNORT, writing attack signatures.

6
Verifying a system's integrity

  • Operating principles.
  • What are the products available?
  • Overview of Tripwire or AIDE (Advanced Intrusion Detection Environment).
  • Vulnerability auditing.
  • Principles and methods and organizations for managing vulnerabilities.
  • Reference site and overview of auditing tools.
  • Defining a security policy.
  • Study and implementation of Nessus (status, operation, evolution).
Hands-on work
Vulnerability auditing of the network and servers using Nessus and Nmap. Website vulnerability auditing.

7
Managing security events

  • Handling information reported by various security equipment.
  • Consolidation and correlation.
  • Overview of SIM (Security Information Management).
  • SNMP management and protocol: Security strengths and weaknesses.
  • SNMP security solution.
Hands-on work
Setting up a SNMP attack.

8
Wi-Fi network security

  • How do you make a WiFi network secure?
  • Intrinsic weaknesses of WiFi networks.
  • SSID Broadcasting, MAC Filtering: What do they add?
  • Is WEP still useful?
  • The WPA protocol, the first acceptable solution.
  • WPA implementation in shared key mode, is it enough?
  • WPA, Radius and AAA server, enterprise implementation.
  • The 802.11i and WPA2 standards: Which solution is the most advanced today?
  • Injecting traffic, cracking WiFi keys.
Hands-on work
Configuring tools for traffic capture, scanning networks and analyzing Wi-Fi traffic. Configuring an AP (access point) and implementing security solutions.

9
Telephony-over-IP security

  • Voice-over-IP concepts. Overview of applications.
  • Architecture of a VoIP system.
  • The SIP protocol, an open voice-over-IP standard.
  • Weaknesses of the SIP protocol.
  • Problems with NAT.
  • Attacks on telephony-over-IP.
  • What are the security solutions?

10
Email security

  • Architecture and operation of email.
  • Protocols and access to emails (POP, IMAP, Webmail, SMTP, etc.).
  • Problems and classifications of email attacks (spam, phishing, identity theft, etc.).
  • Spam fighters.
  • Methods, architectures, and tools for fighting spam.
  • Email address collection tools.
  • Solutions implemented against spam.


Customer reviews
4,3 / 5
Customer reviews are based on end-of-course evaluations. The score is calculated from all evaluations within the past year. Only reviews with a textual comment are displayed.


Dates and locations

Dernières places
Date garantie en présentiel ou à distance
Session garantie
From 16 to 19 September 2025 *
FR
Remote class
Registration
From 7 to 10 October 2025
FR
Remote class
Registration
From 7 to 10 October 2025
EN
Remote class
Registration
From 18 to 21 November 2025 *
FR
Remote class
Registration
From 16 to 19 December 2025
FR
Remote class
Registration
From 17 to 20 February 2026
FR
Remote class
Registration
From 17 to 20 February 2026
EN
Remote class
Registration
From 14 to 17 April 2026
FR
Remote class
Registration
From 16 to 19 June 2026
FR
Remote class
Registration
From 16 to 19 June 2026
EN
Remote class
Registration
From 18 to 21 August 2026
FR
Remote class
Registration
From 18 to 21 August 2026
EN
Remote class
Registration
From 27 to 30 October 2026
FR
Remote class
Registration
From 15 to 18 December 2026
FR
Remote class
Registration
From 15 to 18 December 2026
EN
Remote class
Registration