|About | Courses | Joint Programs | Related sites | Contact us|
- July 20 - July 24, 2015
(Chicago, IL) Apply Now >>>
Network SecurityS.T.R.E.A.M/Technology Lab Courses - The Federal Reserve Bank of Chicago
Type of Participant Targeted
The Network Security course is a one-week course intended for examiners with IT examination responsibilities, but who may not have had university training in information technology. At least one year of field examination experience is preferred.
This course provides participants with a technical grounding in networking concepts and technologies that are critical to IT operations in financial institutions, including TCP/IP networking protocols and common network infrastructures and configurations. The course examines key network perimeter security tools, including firewalls and intrusion detection/prevention systems (IDS/IPS).
After completing the course, the participant, at a minimum, will be able to
- Explore, map, and analyze realistic TCP/IP networks using a variety of diagnostic software tools
- Examine the role of access controls within an networked environment
- Explore the different firewall types and architectures that exist in a simulated e-banking setting
- Identify the different IDS products currently available, determine the limitations of these products, and understand the controls needed for maintaining an IDS infrastructure
- Discuss examination procedures outlined in the IT Examination Handbook produced by the FFIEC
- Conduct hands-on lab work utilizing commonly available network tools
Participants will learn the essential components of a network. For each technical element (e.g., firewalls and intrusion detection systems), appropriate controls will be reviewed.
Examiners should be able to articulate the key risk elements associated with operating and managing a production network. Good network security starts with an accurate risk assessment. Accuracy in this case means that consideration should be given to potential risks for each system (internal and external) and that all systems should be inventoried. Change management is critical as is ensuring that hosts are hardened according to corporate guidelines. Remote access also needs to be managed to include some form of monitoring and logging. Finally, the financial institution must be able to articulate a risk-mitigation strategy; this should be reviewed to ensure that new applications and/or systems are treated from a holistic perspective, and that controls for all systems are re-evaluated for effectiveness periodically.
By module, the following learning objectives will be accomplished:
|Network Attack Vectors||
|Perimeter Defense: Firewalls||
This course is developed and supported by a group of instructors with extensive examination experience and expertise in banking technologies. Instructors come from across the Federal Reserve System as well as other regulatory agencies and industry.