Tactical Perimeter Defense

Displaying courses for United States [Change]


This course is designed to provide network administrators and certification candidates with hands-on tasks on the most fundamental perimeter security technologies. The course covers the issues every administrator must be familiar with.


  • Describe the core issues of building a perimeter network defense system.
  • Investigate the advanced concepts of the TCP/IP protocol suite.
  • Secure routers through hardening techniques and configure Access Control Lists.
  • Design and configure multiple firewall technologies.
  • Examine and implement IPSec and Virtual Private Networks.
  • Design and configure an Intrusion Detection System.
  • Secure wireless networks through the use of encryption systems.


Network Defense Fundamentals

  • Defense fundamentals
  • Defensive Technologies
  • Objectives of Access Control
  • The Impact of Defense
  • Network Auditing Concepts

Advanced TCP/IP

  • TCP/IP Concepts
  • Analyzing the Three-way Handshake
  • Capturing and Analyzing IP Datagrams
  • Capturing and Analyzing ICMP Messages
  • Capturing and Analyzing TCP Headers
  • Capturing and Analyzing UDP Headers
  • Analyzing Packet Fragmentation
  • Analyzing an Entire Session

Routers and Access Control Lists

  • Fundamental Cisco Security
  • Routing Principles
  • Removing Protocols and Services
  • Creating Access Control Lists
  • Implementing Access Control Lists
  • Logging Concepts

Designing Firewalls

  • Firewall Components
  • Creating a Firewall Policy
  • Rule Sets and Packet Filters
  • Proxy Servers
  • The Bastion Hosts
  • The Honeypots

Configuring Firewalls

  • Understanding Firewalls
  • Configuring Microsoft ISA Server 2006
  • IPTables Concepts
  • Implementing Firewall Technologies

Implementing IPSec and VPNs

  • Internet Protocol Security
  • IPSec Policy Management
  • IPSec AH Implementation
  • Combining AH and ESP in IPSec
  • VPN Fundamentals
  • Tunneling Protocols
  • VPN Design and Architecture
  • VPN Security
  • Configuring a VPN

Designing an Intrusion Detection System

  • Goals of an Intrusion Detection System
  • Technologies and Techniques of Intrusion Detection
  • Host-based Intrusion Detection
  • Network-based Intrusion Detection
  • The Analysis
  • How to use an IDS
  • What an IDS Cannot Do

Configuring IDS

  • Snort Foundations
  • Snort Installation
  • Snort as an IDS
  • Configuring Snort to Use a Database
  • Running an IDS on Linux

Securing Wireless Networks

  • Wireless Networking Fundamentals
  • Wireless LAN (WLAN) Fundamentals
  • Wireless Security Solutions
  • Wireless Auditing
  • Wireless Trusted Networks

Training provider

Teaching mode:
Online - Self paced
Classroom - Instructor Led
Duration: 5 days
Gooroo has partnered with the global leaders in IT training to give you access to quality training, personalised to you, targeted at increasing your job opportunities and salary.

Our pricing

We do not display pricing as Gooroo members qualify for special discounts not available elsewhere. You must enquire through Gooroo to get this benefit.

New courses are happening all the time

Our partner's expert training consultant will provide you with the times and all the details you need. Enquire today.

Top skills covered in this course

United States
This skill has an average salary of
and is mentioned in
of job ads in this area.
United States
This skill has an average salary of
and is mentioned in
of job ads in this area.
Transmission Control Protocol
United States
This skill has an average salary of
and is mentioned in
of job ads in this area.
United States
This skill has an average salary of
and is mentioned in
of job ads in this area.