ISS - ISS-CS Course
Course
In Bangalore
Description
-
Type
Course
-
Location
Bangalore
Facilities
Location
Start date
Start date
Reviews
Course programme
ISS - ISS-CS Course
ROOMAN is the only Authorized Training Partner of ISS in India. We provide Internet Security Systems and X-Force Protection Certification program with advanced curriculum, state-of-the-art training, and graduated levels of certification. This course covers Site protector administration and scanning vulnerabilities using Internet Scanner.
Audience : System Administrators, Security Managers, Network Engineers and Individual seeking ISS certification.
Course Contents :
Introduction to RealSecure SiteProtector:
Firewalls and IDS:
*
* Network Versus Host Intrusion Detection. SiteProtector Components and Architecture.
* Strategies for Deploying Network and Server Sensors.
* Stealth Mode and Out-of-Band Reporting.
Installation of Real Secure Site Protector:
* Basic and custom Installation Requirements.
* RealSecure SiteProtector Licenses.
* SiteProtector components Communication.
* Managing SiteProtector User Roles and Access.
*
Migrating RealSecure 6.x Data to SiteProtector.
Configuring and Using the SiteProtector Console:
* Site Manager Command and Control Tools.
* Configuring the SiteProtector Console.
* Add License Files to SiteProtector Database.
Managing SiteProtector Components:
* Registering SiteProtector Components and Sensors.
* Configuring SiteProtector components Properties.
* Monitoring the Status of Components and Sensors.
* Troubleshooting Connectivity Issues.
SiteProtector Updates:
*
* How the Update Process Works. How XPU Packaging Affects SiteProtector.
* Installing and Removing Updates.
* Installing Updates Manually.
Managing Sensor Policies:
*
* SiteProtector Sensor Policies. Using Policy Editor.
* Migrating Custom Sensor Policies.
Monitoring and Analyzing Events:
*
* Analyzing Event Data. Clearing and Purging Event Data.
* Export Event Detail Information and Generating Reports.
* Create and Clear a Basic Filter.
* Creating Custom Analysis Views.
* Performing Analysis View Baselining.
Configuring Network Sensor:
* Network Sensor Policies.
* Network Sensor in Stealth Mode.
* Configuring Network Sensor Events.
* Using Trons Rules with Network Sensor.
Configuring Server Sensor:
*
* Server Sensor Policies. Types of Server Sensor Events.
* Using Firecell Signatures.
* Detect Unusual Administrator Activity.
Scanning for Vulnerabilities:
*
* Planning for Routine Vulnerability Scanning. Scheduling Vulnerability Scans.
* Managing large, time-consuming Vulnerability Scans.
* Performing Periodic Inventory Scans.
Working with Events and Responses:
*
* Configuring Event Responses. Block Response on Windows (Dynamic Blocking).
* Global Responses Versus Sensor Responses.
* Understanding Event Propagation.
* Advanced Consolidation of Events.
Using the Security Fusion Module:
*
* Understanding Correlation. How the Correlation Works in SiteProtector.
* Installing and configuring the Security Fusion Module.
* Monitoring Security Fusion Events.
Using the Enterprise Dashboard:
*
* Accessing and Navigating the Enterprise. Dashboard. Working with Multiple Sites.
* Creating Enterprise Reports.
* Filter Site Metrics and Comparison Data.
Internet Scanner:
* Introduction to Network Security.
* The Importance of Risk Measurement and Management .
* Planning and Implementing a Security Policy.
Introduction to Internet Scanner:
* Overview of Internet Scanner.
* Internet Scanner Architecture.
* Identifying Security Levels of Internet Scanner.
Installing Internet Scanner:
*
* Obtaining License Files. Creating Public Authentication Keys for Additional Internet Scanner Users.
* Installing a Database.
* Install Internet Scanner.
* Install License File.
X-Press Updates:
* Using X-Press Updates.
* X-Press Update Resources.
* Installing X-Press Updates.
* Maintaining Internet.
Navigating Directories and Menus:
*
* Internet Scanner Module Locations. Directory Structure.
* The Internet Scanner Sensor and console Directory.
* Creating and Saving Sessions.
* Working with Sessions.
* Creating a New Session Entering Host Range.
* Creating a New Session Using Host File.
* Using a Session in the Database.
Working With Policies:
*
* Introduction to Policies. Assessment Scan Policies.
* Dynamic Check Assignment.
* Searching for a specific vulnerability check.
* Common Settings.
* Changing the Policy Association with a Session.
Fundamentals of Scanning:
*
* Scanning Methodology. Firewall Considerations.
* Guidelines for Prioritizing Vulnerabilities.
* Scanning Methods.
* Performance Tuning.
* Managing Large, Time-Consuming Vulnerability Scans.
Database Scanner Integration:
*
* Introduction to Database Scanner. Database Vulnerabilities.
* OS Penetration by Database.
* Installing Database Scanner.
* Using Database Scanner with Internet Scanner.
* Penetration Testing.
Scanning Windows Machines and Domains:
*
* Scanning Windows Machines and Domains. Using SmartScan.
* The Known Accounts Editor.
Using FlexChecks:
*
* Configuring FlexChecks. FlexChecks in a Generated Report.
* Enabling or Disabling a FlexCheck.
* Editing FlexCheck Settings.
* Testing the FlexChecks Engine.
Working with Databases:
* Database Tables.
* Database Administration.
* Purging Data from the Database.
* Migration from 6.2.1 to 7.0 .
Working with Reports:
*
* Report Categories. Generating a Report.
* Command-Line Reporting Rules.
* Merge Session Utility.
* Importing and Exporting a Report.
* Analyzing Reports.
ISS - ISS-CS Course