|About | Courses | Seminars | Self-study tools | Related sites | Contact us|
- October 7 - October 11, 2013
(Chicago, IL) Apply Now >>>
Network Security, Session 2S.T.R.E.A.M/Technology Lab Courses - The Federal Reserve Bank of Chicago
Type of Participant Targeted
The Network Security course is a one-week course intended for examiners with IT examination responsibilities, but who may not have had university training in information technology. At least one year of field examination experience is preferred.
This course provides participants with a technical grounding in networking concepts and technologies that are critical to IT operations in financial institutions, including TCP/IP networking protocols and common network infrastructures and configurations. The course examines key network perimeter security tools, including firewalls and intrusion detection systems (IDS).
After completing the course, the participant, at a minimum, will be able to
- Explore, map, and analyze realistic TCP/IP networks using a variety of diagnostic software tools
- Implement, test, and maintain common firewall types and architectures in a simulated e-banking setting
- Identify different IDS products currently available, effectively implement and manage these systems, and understand the controls needed for maintaining an IDS infrastructure
- Discuss examination procedures outlined in the IT Examination Handbook produced by the FFIEC
Participants will learn the essential components of a network. For each technical element (e.g., firewalls and intrusion detection systems), appropriate controls will be reviewed.
|Topic/Activity||Approximate Class Hours|
|Network Attack Vectors||1.00|
|Anti-Virus and Spyware Exercises||1.00|
|Microsoft Baseline Security Analyzer Exercise||1.00|
|Perimeter Defense: Firewalls||2.00|
|Password Cracking Exercise||.50|
|Network Diagramming and Exercises||3.00|
|Wireless Networking and Exercises||1.50|
|Encapsulation and Exercises||2.00|
|Firewalls and Exercises||2.50|
|Intrusion Detection/Prevention Systems||2.50|
|Capstone Discussion and Demonstration||2.50|
Examiners should be able to articulate the key risk elements associated with operating and managing a production network. Good network security starts with an accurate risk assessment. Accuracy in this case means that consideration should be given to potential risks for each system (internal and external) and that all systems should be inventoried. Change management is critical as is ensuring that hosts are hardened according to corporate guidelines. Remote access also needs to be managed to include some form of monitoring and logging. Finally, the financial institution must be able to articulate a risk-mitigation strategy; this should be reviewed to ensure that new applications and/or systems are treated from a holistic perspective, and that controls for all systems are re-evaluated for effectiveness periodically.
Accomplishments by module
|Network Attack Vectors||
|Perimeter Defense: Firewalls||
Network Security courses include one or more instructor(s) from the Federal Reserve System and may also include instructors from an external agency.