Description
Information is the heart of any business or industry. It provides sustenance to organizational units: empowering and strengthening its users as groups and individuals. It can be used for or against us, naturally concerning us with the safety and integrity of our information. If the nature of our information is to be distributed for accessibility, then so must our efforts to secure it. The distributed computing industry has utilized the International Standards Organization’s (ISO) Open System Interconnection (OSI) Model for better standardization of hardware and software components. Some layers have more impact than others when securing information. Together, they can be used to build a comprehensive solution. This project describes network security hardening at each layer of OSI model in primary level using security mitigation technics. Since high end IPS, IDS and ASA firewalls are not available with small to medium scale organizations, this approach would be the efficient and cost-effective way to secure Information systems from inside and outside network attacks.
Pre-requisites/Implementation Technologies
Technologies |
---|
1 . Network Routing & Switching |
2 . Network Security |
Hardware |
---|
1 . Cisco 1941 Route – 1 |
2 . Cisco Catalyst Switch – 1 |
3 . Cisco Packet Tracer 7.2.1 |
4 . Wire Shark (latest version) |
5 . VMWare workstation or Oracle Virtual Box |
Note: One kit will be provided per team for practice.
Project Development Lifecycle
Day | Action plan | Detailed Plan |
---|---|---|
Day 1 | Project Analysis | • Project description and overview • Project limitations and case study • Device Requirements analysis |
Day 2 | Understanding Architecture | • Understanding OSI layered Architecture • TCP/IP and OSI layers a comparison study • Understanding Network topologies |
Day 3 | Understanding OSI layered Architecture | • Network attack vector analysis • Most common network-based attacks • Split the attack surface basis OSI layered structure |
Day 4 | Identifying the possible mitigation technics | • Importance and process of reconnaissance • Identifying the possible mitigation technics • Opensource and proprietary protocols used for network attack mitigation |
Day 5 | Implementation of project | • Process of applying mitigation technics • Implement the recommended actions for security • Network penetration testing |
Day 6 | Testing and Documentation | • Network penetration testing • Study testing results after analysis • Presentation and Documentation |
Team Size and Price
Team Size | Price for Team |
---|---|
4 | 4000 |
Note: A team can have maximum of 4 members.
Tech Coach

Technical Trainer