- IT CERTIFICATION
- DESKTOP & OFFICE
- WEB & GRAPHICS
- SECURITY & NETWORKING
- PROJECT MANAGEMENT
- TRAINING LIBRARIES
Network+ 2009
MCSE Training
Windows 2003/2008 Messaging
MCITP: Windows 2008
MCPD 3.5 - ASP.NET
MCSE Windows 2003-08 Security
MCPD 3.5 - Windows
CCNA Training
Office 2007 Training Suite
Office 2003 Training Suite
Microsoft Windows 7 Training
Word 2010 Training
Excel 2010 Training
Powerpoint 2010
CISSP Traning Suite
EC Council - CEH v7
EC Council - CHFI
EC Council - ECSA/LPT
EC-Council - ENSA
Microsoft Project 2007
PMP 2011 Exam Prep
Quality Management
Risk Management
Schedule & Cost Control
Security Certified Network Specialist (SCNS) - Tactical Perimeter Defense Training
![]() Instructor
Course Outline
System Requirements
|
COURSE OVERVIEW
Begin your journey through the Security Certified Program (SCP) by taking this course. SCNS is a pre-requisite for becoming certified as a SCNA and SCNP. The SCNS course covers essential defensive concepts that are necessary to secure network perimeters, including firewalls, router security, and intrusion detection. Students will also learn how to install, configure, and maintain network security technology. Before becoming certified as a SCNS, you'll be required to pass the Tactical Perimeter Defense (TPD) examination: SC0-451.
Students will learn the necessary skills and knowledge needed to pass the SCNS exam during this course, including the basics of network defense, advanced TCP/IP, access control lists and routers, configuring and creating firewalls, maintaining virtual private networks, creating intrusion detection systems, and shielding wireless networks.
PACKAGE INCLUDES
- 3 DVD-ROMs with instructor demonstrations, video lectures, and full audio
- Official SCP training curriculum
- Printable study and course materials
-
LearningZone Live Mentor ($695 Value) Click for Details
Get help when it's needed most! Exclusive LearningZone - Chat online with industry experts 24/7 - MeasureUp SCNS Certification Practice Test
- We emphasize creative solutions to commonly encountered development problems
- 1 year upgrade free of charge
- Certificate of Completion
YOUR INSTRUCTOR

Warren Peterson co-founded the Security Certified Program where he currently serves as the President and lead writer for educational content. Warren has authored 9 books about IT security, and he wrote the modern SCP courses.
During the late 90's, Warren decided to develop the SCP to teach IT security to a new generation of specialists. He has managed the company's growth from its humble origins in a Chicago classroom to a worldwide training program.
FEATURES
-
Main Menu
The organized and effective structure enables users to browse through hours of comprehensive content rapidly and with ease. -
PowerPoint
PowerPoint presentations improve instruction by displaying all types of information for users. They can better comprehend material by viewing graphs, definitions, charts, etc. -
Exclusive Learning Zone
Train anywhere in the world at any time. Certified online instructors are situated at international support centers in the United States, United Kingdom, Australia, and Singapore to offer support and answer technology-related questions 24 hours a day. In other words, no matter where you live, you can communicate with specialists at any time. This level of interaction between instructors and students makes it possible for students to get answers to specific questions at their convenience. -
Controls
Move ahead, review, or repeat previous topics and sections. A progress bar monitors progress as you complete exercises. -
Full Motion Video
Every course offers full-motion videos of classroom instruction. It's as if you're sitting in a classroom. Our one of a kind delivery mimics a one-on-one classroom setting for more personalized educational experiences. -
Study Guides
Users can print entire course study guides, permitting them to view and review course material at their convenience. -
Review Exercises
Every section contains a review quiz to assist and enhance learning by testing whether students comprehend course concepts before moving forward. -
Resume
Every course resumes where you finished during the previous session in case you forget where you stopped. -
Live Demonstrations
Instructors provide live and "hands on" demonstrations to explain and show users how to complete tasks. This enables users to witness professionals perform everyday tasks in real world settings as often as they like. -
Certificate of Completion
We are internationally recognized for our technology-centered IT training programs. Once you finish a program, you'll receive a Certificate of Completion.
COURSE OUTLINE
Five Key Issues of Network Security - Authorization and Availability
Five Key Issues of Network Security - Authentication
Five Key Issues of Network Security - Confidentiality
Five Key Issues of Network Security - Integrity
Five Key Issues of Network Security - Non-Repudiation
Managing the Threats to Security
Defensive Strategies
The Castle Analogy
The Defense Technologies
Analyzing Defense
Objectives of Access Control
Access Control
Authentication
Authentication Token
Example of a Challenge Response Token
Time Based Tokens
Core Defensive Technologies
Define the Concepts of Network Auditing
Concepts of Network Auditing
Security Audits
Independent Audit
Quick Audit Results
Managing Audit Data
Lesson 1 Review
TCP/IP Concepts
TCP/IP Model Layers
OSI Model Layers
OSI Model vs. TCP/IP Model
The TCP/IP Encapsulation Process
RFCs (Requests for Comments)
The Function of IP
IP Address Classes
Address Class Chart
Private IP Address Ranges (RFC1918)
IP Addressing
Hexadecimal IP Addressing
Hexadecimal Conversions
The Subnet Mask
Subnetting Example
Routing
VLSM and CIDR
‘Slash’ Notation
X-casting
Analyze the 3-Way Handshake
TCP Control Flags
Sequence and Acknowledgment Numbers
Connection Establishment
Connection Termination
Ports
IANA Assignments
Port Numbers and Associated Services
Trojan Associated Port Numbers
Network Monitor
Demo - Using Network Monitor
Wireshark
Demo - Installing and Starting Wireshark
Wireshark Overview
Demo - Using Wireshark
TCP Connections
Demo - Analyzing the Three-way Handshake
Demo - Analyzing the Session Teardown Process
Capture and Identify IP Datagrams
IP Datagram
Demo - Capturing and Identifying IP Datagrams
Capture and Identify ICMP Messages
Demo - Capturing and Identifying ICMP Messages
Capture and Identify TCP Headers
TCP Header
Demo - Capture and Identify TCP Headers
The UDP Header
Demo -Working with UDP Headers
Analyze Packet Fragmentation
MTUs for Various Media
Demo - Analyzing Fragmentation
Analyzing Entire Sessions
Demo - Complete ICMP Session Analysis
Demo - Complete FTP Session Analysis
Lesson 2 Review
Fundamental Cisco Security
Modes of Operation
Navigating the Router
Configuring Access Passwords
Other Configuration Options
SSH Overview
SSH Configuration Options
Routing Principles
ARP Broadcast Between Two Nodes
Router Returning the ARP Request
Demo - Performing IP and MAC Analysis
The Routing Process
Routed vs. Routing Protocols
Routing Protocol Metrics
Routing Protocols
Demo - Viewing a RIP Capture
RIPv2
Demo - Viewing a RIPv2 Capture
Removing Protocols and Services
Cisco Discovery Protocol (CDP)
ICMP
Creating Access Control Lists
Access Control List Operation
The Wildcard Mask
Wildcard Mask Bits Defined
Implement Access Control Lists
Standard Access Control List Command Syntax
Extended Access Control List Syntax
ACL Scenarios
Grant and Denial Examples
Defending against Attacks with ACLs
Logging Concepts
Cisco Logging Options
Log Priority
Logging Examples
ACL and VTY Logging
Lesson 3 Review
Examine Firewall Components
Firewall Methodologies
What a Firewall Cannot Do
Implementation Options for Firewalls
A Single Packet Filtering Device
A Screened Host
A Demilitarized Zone
Create a Firewall Policy
Firewall Policy
Rule Sets and Packet Filters
Locations of Packet Filters
The Packet Filter Rules
Considerations for Packet Filtering Devices
Ports and Sockets
Ports in Exchange of a Web Page
Building Rules for the Firewall
The Ack Bit
Stateless and Stateful Packet Inspection
Stateless Packet Filters
Stateful Packet Filters
Stateful Packet Filter Function
Proxy Server
Proxy Process
Proxy Benefits
Proxy Problems
The Bastion Host
Location of a Bastion Host
Creating a Bastion Host to Run as a Firewall
The Honeypot
Honeypot Locations
Goals of the Honeypot
Lesson 4 Review
Understanding Firewalls
Firewalls and the OSI Model
Common Types of Firewalls
Building Firewall Rules
What a Firewall Cannot Do
Configuring Microsoft ISA Server 2006
ISA Server 2006
ISA Server 2006 Versions
ISA Server 2006 Features
Demo - Preparing for the ISA Server 2006 Install
Demo - Install Microsoft ISA Server 2006
Configuring ISA Server 2006
ISA Server Management Console
Demo - Exploring the Microsoft ISA Server 2006 Interface
Demo - Exporting the Default Configuration
ISA Server 2006 Firewall Policies
Processing Firewall Policies
Demo - Creating a Basic Access Rule
ISA Server 2006 Access Rule Elements
Demo - Creating a Protocol Rule Element
Demo - Creating a User Rule Element
Demo - Creating a Content Group Element
Demo - Creating and Modifying Schedule Rule Elements
Demo - Using Content Types and Schedule Rules
ISA Server 2006 Network Rule Elements
Demo - Creating a Network Rule Element
ISA Server 2006 Publishing Rules
Demo - Configuring a Web Publishing Rule
ISA Server 2006 Caching
Demo - Enabling and Configuring Caching
Demo - Install Second Loopback Adapter
Demo - Configure ISA in a Three-Legged DMZ
Configure ISA Server Monitoring
Demo -Working with Alerts
Demo -Working with Reports
ISA Server 2006 Logging
Demo - Configuring Logging Options
Final ISA Server 2006 Options
Demo - ISA Server 2006 and the Security Configuration Wizard
Demo - Configuring Packet Prioritization
IPTables Concepts
Chain Fundamentals
Process of the Packets
The Flow of the Chains
Configuration Options
Rule Management
Rule Creation
Other Options
Rule Examples
Example: Case Study
Lesson 5 Review