30 Hours(For Regular Course)

4-8 Hours(For Capsule Course)

Enroll Now

Request more information

Perimeter protection in-depth

This web-based training course on Perimeter protection in-depth functionality, administration and development, is available online to all individuals, institutions, corporates and enterprises in India (New Delhi NCR, Bangalore, Chennai, Kolkatta), US, UK, Canada, Australia, Singapore, United Arab Emirates (UAE), China and South Africa. No matter where you are located, you can enroll for any training with us - because all our training sessions are delivered online by live instructors using interactive, intensive learning methods.

A perimeter of a network or a network system is the outer periphery or the last wall of protection from the inside and the first line of protection from the outside. This makes it a very important and imperative level of defense. The normal method for protecting the periphery or perimeter of your network system would be to create a firewall. Sadly, this is not at all enough in today's growing digitized world and more competent hackers. To safely protect the perimeter, a number of security techniques and methodologies are required which are used for defending the system from remote attacks. At every layer of the perimeter, a number of tools and processes are employed to safeguard and strengthen the security system. Inherent knowledge of how the perimeter is bypassed and how the system is compromised is required for safely securing the system network.

This computer security training or network security online training makes the trainees to understand the complexities of internet protocols and how they can be controlled over the wire. Instead of focusing on the products or tools used for the process, the entire focus will be on the process itself so that the trainees can easily switch from one product or tool to another. A number of solutions such as Palo Alto, FireEye, Bit9 and Carbon black will be detailed. The information and application security course provides information for performing wire level assessment of potential tools and how effective they are. The various services and OS lockdown techniques will be talked about along with the various third party tools for permitting endpoint protection and application policy enforcement. The perimeter protection online training course also covers advanced malware protection policies and threat protection methods. There are no pre-requisites for the course but it will be beneficial if the students have some working knowledge of networks and how communication is done over networks.

Threat Vectors

  • ystem Vulnerability
  • Defense Against Apts
  • APT Life Cycle

OSI Layer 2

  • ARP Working
  • Hijacking Communication Sessions
  • Methods Of Connection Hijacking

OSI Layer 3

  • Offset And Measurement
  • Layout Of IP Header
  • IP Header Fields And Their Usage
  • Record Route Attacks Implementation
  • Differentiating Strict And Loose Source Routing Attacks
  • Detecting A Source Route Attack
  • Fragmentation And Implementation And Its Kinds

OSI Layers 4 And 5

  • Important UDP Header Format
  • UDP Scans
  • Important TCP Header Format
  • Types Of TCP Patterns
  • TCP Flags And Their Working
  • TCP Sequence Numbers And Their Working
  • TCP Port Scans Manipulation
  • Important ICMP Header Formats
  • ICMP Types And Codes
  • Traffic Control Using ICMP
  • ICMP As A Covert Communication Channel

Packet Decoding

  • Packet Sniffer Working
  • Reading Libpcap
  • Windump And Tcpdump
  • Display Filters
  • Reading And Saving Capture Files
  • Bit Masking Usage And Implementation
  • Caveats


  • Migrating From Ipv4
  • Transitions
  • Important Ipv6 Header Formats
  • Ipv6 Addressing
  • Ipv6 Extension Headers
  • Icmpv6
  • Ipv6 Security Issues
  • Tunnel Brokers

Static And Stateful Packet Filtering

  • Static Filters Working
  • Complex Protocols
  • SI Firewalls And NIPS
  • Stateful Filters Working
  • State Table Manipulation

NAT And Stateful Inspection

  • Stateful Inspection Working
  • Stateful Inspection Implementation In Application Security
  • Trusted Host Creation
  • NAT Implementation
  • Strengthening Security Perimeter With NAT

Packet Crafting

  • Working Of Packet Crafting Tools
  • Testing Perimeter Security Systems
  • Packets Used To Find Holes In Firewalls

Assessment Of Perimeter

  • Options And Approaches
  • Using The Right Tools
  • Scripts For Policy Verification
  • Deep Testing With New Firewall Products

Virtual Firewalls And Proxies

  • Virtual Firewalls
  • Fast Path Vs Slow Path Deployment
  • Virtualization Negatives
  • Working Of Proxy

More About Stateful

  • Ahead Of Traditional Port Based Defenses
  • Next Generation Firewalls Working
  • Next Generation Firewalls Decision Making
  • Unified Threat Management Working
  • Deep Packet Inspection Working
  • Deployment Scenarios Of Next Generation Firewall

Locking Down Hosts

  • Securing DNS
  • Split And Split-Split DNS Runs
  • Recursions And Avoiding Them
  • Avoiding Spam Relay
  • Testing DNS And SMTP Setups
  • Scrubbing Banners

Analysis Of Firewall Log

  • Records
  • Patterns Detection In Stream
  • Analyzing Firewall Information
  • Parsing Firewall Logs

Wireless Security

  • WEP Analysis
  • WPA And WPA2 Analysis
  • 802.1X
  • Design Considerations
  • VPN Solution For Wireless Security

Basics Of Authentication, Encryption And VPN

  • Symmetrical Key Cryptography
  • Stream And Block Ciphers
  • Public Key Cryptography
  • Algorithms Of Cipher
  • Good Encryption And Time Value Issues
  • Political Laws
  • Use Of Hash
  • Initial Authentication
  • Packet-Level Authentication
  • Digital Certificates
  • X.509 And PKI

Firewalls For Applications

  • Common Web Application Attacks
  • Cross-Site Scripting
  • SQL Injection
  • Blind SQL Injection
  • Options Of Deployment
  • Methods Of Evasion

Protection Of Endpoint

  • Can HIPS Really Prevent Zero-Day Attacks?
  • Application Control
  • Whitelisting
  • Keeping All Malware Off Of Your Systems
  • Taking Control Of USB Drives
  • Bit9 And Carbon Black
  • Data Loss Prevention Solutions

Advanced Malware Protection

  • Methods Of Evaluation
  • Sandboxing
  • Cuckoo
  • Fireeye

Security Information And Event Management

  • Time Synchronization
  • Setting Up NTP On Various Platforms
  • Centralized Collection System

VPN Options

  • VPN Structure
  • SSL Working
  • SSH Working
  • Security Problems In SSH Tunnels
  • Ipsec Working
  • Ipsec Connections
  • Remote Control Options
  • VDI

Perimeter security solution is one of the most essential parts of any network security model requiring immense expertise and professionalism. Network security without any exception is one of the most essential aspects of identifying and minimizing weaknesses while deploying and using multiple firewalls and perimeter security solutions. Industry professionals who are experts in securing perimeters of the network will find immense career and job prospects globally in multiple domains and industries. This course is highly recommended for information security officers, intrusion analysts, IT managers, network architects, security architect, security auditors and such professionals.

1. Are lab-sessions available after theory sessions?

We provide online lab facilities to all our students, wherever possible & applicable, using a combination of one or more options, including global ASP setups, live-environments, real-time simulations, training-videos, PPTs, Screenshots and others.

2. Who and how qualified are the instructors?

All our instructors go through a rigorous and multiple processes of filtering and selection before they are appointed by us. Only the most qualified, most experienced and best suited candidates are chosen as instructors.

3.What are the machine requirements for the course?

You must have a fairly good desktop PC or laptop. You can even access these courses on your tabs or smart phones. For PCs and laptops the configuration should be at-least an Intel Pentium processor, 4GB of RAM and 50 to 100 GB of free hard disk space. You must also have a good and steady WiFi internet connection which works at 3G or 4G speeds.

4.How will I undergo practical training in the course?

Depending on the type of lab facilities available for the course you have enrolled in for our instructor would be happy to help you in your lab sessions.

5.What is the process to get my questions/queries answered?

Get in touch with your trainer. You can also consult your batch-mates. We believe in collaborative and practical learning.

6.Can a free demo session be provided?

We do not provide free demo sessions.

7.Will there be a provision for repetition if I miss a class?

We encourage our trainees to attend all sessions. If you have missed a session we will try out best to update you on it, if possible. Else you will need to pay a small fee to have a repeat session arranged specifically for you.

8.Does your organization provide assistance in job hunting?

We are connected across the industry in India and abroad. We will pass on any job openings from our customer to our trainees. But we are not a manpower placement provider.

9.How and where can I make the payment?

You can pay using any credit or debit card in India or abroad. You can also pay using your PayPal account.

10. Will practice material or tests be also provided with the course?

Yes. As required & as applicable.

11.What is the minimum or maximum batch size?

Minimum/maximum batch sizes vary from course to course, depending upon a number of factors. It can vary from as few as 2 to as many as a few hundred, in some cases. But that number does not impact the quality of training that we deliver due to our tight quality-control mechanisms.

All trainees will be provided with a course participation and completion certificate by Aurelius Corporate Solutions. Please note, we are an independent provider of learning solutions. We are not affiliated in any manner to any company or organization.

Copyright © 2016 Aurelius Corporate Solutions Pvt. Ltd. All Rights Reserved.