This certification is the starting point with the Security Certified Program (SCP). SCNS is a required pre-requisite for going further towards the SCNP and SCNA certifications. The SCNS focuses on the critical defensive technologies that are the foundation of securing network perimeters, such as firewalls, intrusion detection, and router security. This certification tests the candidate’s ability to work with, and implement, real world security technology. To become SCNS certified, candidates must successfully pass one exam. This exam is named: Tactical Perimeter Defense (TPD). The exam uses number: SC0-451.
Lesson 1: Network Defense Fundamentals
- Describe Network Defense
- Identify Defensive Technologies
- Describe the Objectives of Access Control
- Identify the Impact of Defense
- Define the concept of Network Auditing
Lesson 3: Routers and Access Control Lists
- Fundamental Cisco Security
- Routing Principles
- Removing Protocols and Services
- Creating Access Control Lists
- Implementing Access Control Lists
- Logging Concepts
Lesson 5: Configuring firewalls
- Understanding Firewalls
- Configuring Microsoft ISA Server 2006
- Iptables Concepts
- Implementing Firewalls Technologies.
Lesson 7: Designing An Intrusion Detection system
- The Goals of an Intrusion Detection System
- Technologies and Techniques of Intrusion Detection
- Host- based Intrusion Detection
- Network –based intrusion Detection
- The Analysis
- How to Use IDS
- What an IDS Cannot Do
Lesson 2: Advanced TCP/IP
- TCP/IP Concepts
- Analyzing the three –way Handshake
- Capturing and Identifying IP Datagram’s
- Capturing And Identifying ICMP massages
- Capturing and Identifying TCP Headers
- Capturing and Identifying UDP Headers
- Analyzing Packet Fragmentation
- Analyzing an Entire Session
Lesson 4: designing Firewalls
- Firewalls Components
- Create a Firewalls Policy
- Rule Sets and Packet Filters
- Proxy Server
- The Bastion host
- The Honeypot
Lesson 6: Implementing IPSec and Vpns
- Internet Protocol Security
- IPSec Policy Management
- IPSec AH Implementation
- Combining AH and ESP in IPSec
- VPN Fundamentals
- Tunneling Protocols
- VPN Design and Architecture
- VPN Security
- Configuring a VPN
Lesson 8: Configuring an IDS
- Snort Foundations
- Snort Installation
- Snort as an IDS
- Configuring Snort to Use a Database
- Running an IDS on Linux
Lesson 9: Securing Wireless Networks
- Wireless Networking Fundamentals
- Wireless LAN (WLAN) Fundamentals
- Wireless Security Solutions
- Wireless auditing
- Wireless Trusted Networks