SCNS Training Boot Camp
Security Certified Network Specialist (SCNS)
GlobalNet Training is an Authorized Training Partner with the Security Certified Program. We are pleased to offer The Security Certified Network Specialist (SCNS) course. Over the five days of the course, candidates learn the critical defensive technologies that are the foundation of securing network perimeters, such as firewalls, intrusion detection, and router security. The up-to-date security lessons and the hands-on labs in the SCNS courseware bring the security networking world to the candidates.
The Security Certified Network Specialist (SCNS) program focuses on the critical defensive technologies that are the foundation of securing network perimeters. The up-to-date security lessons and the hands-on labs in the SCNS courseware bring the security networking world to the candidates.
About Security Certified Program
The Security Certified Program (SCP) (www.SecurityCertified.Net) provides real world security education and certifications that help improve job skills and create more secure organizations. SCP develops multi-level, vendor neutral, security certification and training programs that assist individuals in acquiring necessary job skills and certifications. SCP Certifications include: Security Certified Network Specialist (SCNS), Security Certified Network Professional (SCNP) and Security Certified Network Architect (SCNA). The Security Certified Program, LLC is a privately-held company, based in Geneva, Illinois, USA.
The SCNS certification is the pre-requisite towards the Security Certified Network Professional (SCNP), and the ultimate in security certifications: the Security Certified Network Architect (SCNA). Please visit our website for the next step in your certification path, the SCNP Bootcamp.
To ensure your success, we recommend that you have CompTIA’s Security+ certification, or have equivalent experience. This course assumes that the student has fundamental working knowledge of networking concepts, and foundational security knowledge.
Lesson 1: Network Defense Fundamentals
Topic 1A: Network Defense
Topic 1B: Defensive Technologies
Topic 1C: Objectives of Access Control
Topic 1D: The Impact of Defense
Topic 1E: Network Auditing Concepts
Lesson 2: Advanced TCP/IP
Topic 2A: TCP/IP Concepts
Topic 2B: Analyzing the Three-way Handshake
Topic 2C: Capturing and Identifying IP Datagrams
Topic 2D: Capturing and Identifying ICMP Messages
Topic 2E: Capturing and Identifying TCP Headers
Topic 2F: Capturing and Identifying UDP Headers
Topic 2G: Analyzing Packet Fragmentation
Topic 2H: Analyzing an Entire Session
Lesson 3: Routers and Access Control Lists
Topic 3A: Fundamental Cisco Security
Topic 3B: Routing Principles
Topic 3C: Removing Protocols and Services
Topic 3D: Creating Access Control Lists
Topic 3E: Implementing Access Control Lists
Topic 3F: Logging Concepts
Lesson 4: Designing Firewalls
Topic 4A: Firewall Components
Topic 4B: Create a Firewall Policy
Topic 4C: Rule Sets and Packet Filters
Topic 4D: Proxy Server
Topic 4E: The Bastion Host
Topic 4F: The Honeypot
Lesson 5: Configuring Firewalls
Topic 5A: Understanding Firewalls
Topic 5B: Configuring Microsoft ISA Server 2006
Topic 5C: IPTables Concepts
Topic 5D: Implementing Firewall Technologies
Lesson 6: Implementing IPSec and VPNs
Topic 6A: Internet Protocol Security
Topic 6B: IPSec Policy Management
Topic 6C: IPSec AH Implementation
Topic 6D: Combining AH and ESP in IPSec
Topic 6E: VPN Fundamentals
Topic 6F: Tunneling Protocols
Topic 6G: VPN Design and Architecture
Topic 6H: VPN Security
Topic 6I: Configuring a VPN
Lesson 7: Designing an Intrusion Detection System
Topic 7A: The Goals of an Intrusion Detection System
Topic 7B: Technologies and Techniques of Intrusion Detection
Topic 7C: Host-based Intrusion Detection
Topic 7D: Network-based Intrusion Detection
Topic 7E: The Analysis
Topic 7F: How to Use an IDS
Topic 7G: What an IDS Cannot Do
Lesson 8: Configuring an IDS
Topic 8A: Snort Foundations
Topic 8B: Snort Installation
Topic 8C: Snort as an IDS
Topic 8D: Configuring Snort to Use a Database
Topic 8E: Running an IDS on Linux
Lesson 9: Securing Wireless Networks
Topic 9A: Wireless Networking Fundamentals
Topic 9B: Wireless LAN (WLAN) Fundamentals
Topic 9C: Wireless Security Solutions
Topic 9D: Wireless Auditing
Topic 9E: Wireless Trusted Networks
Download the outline for this course.
To download the PDF, right-click the above link and choose “Save target as…” from the context menu.
The SCNS certification requires the passing of one exam (number SC0-451). The SCNS exam is designed to validate the foundation skills required by security professionals. These skills include, but are not limited to: Network Defense Fundamentals, Advanced TCP/IP, Routers and Access Control Lists, Designing Firewalls, Configuring Firewalls, Configuring Virtual Private Networks, Designing an Intrusion Detection System, Configuring an Intrusion Detection System and Securing Wireless Networks.
Tactical Perimeter Defense (TPD), SCO – 451
As the security industry moves quickly, skills require consistent validation. The SCNS credential is valid for two years from the pass date. Recertification is required to maintain good standing.
The Lammle Training Guarantee is subject to the following terms and conditions:
(i) You must notify GlobalNet Training in writing and provide proof of having not passed an applicable professional certification examination within 10 days (two business weeks) following the last day of the Bootcamp you attended; (ii) Your participation in a subsequent Bootcamp under this Guarantee is based on seat availability in a regularly scheduled, open enrollment Bootcamp; (iii) Except for your Bootcamp tuition and enrollment fees you are solely responsible for all costs and expenses incurred in attending a Bootcamp under this Guarantee, including all travel, lodging, meals and other out-of-pocket expenses, such as exams, associated with your participation in such Bootcamp; and (iv) Only individual (single) registrations are eligible to participate under this Guarantee. This Guarantee does not apply to custom or corporate block purchases.