Description

Information is the heart of any business or industry. It provides sustenance to organizational units: empowering and strengthening its users as groups and individuals. It can be used for or against us, naturally concerning us with the safety and integrity of our information. If the nature of our information is to be distributed for accessibility, then so must our efforts to secure it. The distributed computing industry has utilized the International Standards Organization’s (ISO) Open System Interconnection (OSI) Model for better standardization of hardware and software components. Some layers have more impact than others when securing information. Together, they can be used to build a comprehensive solution. This project describes network security hardening at each layer of OSI model in primary level using security mitigation technics. Since high end IPS, IDS and ASA firewalls are not available with small to medium scale organizations, this approach would be the efficient and cost-effective way to secure Information systems from inside and outside network attacks.


Pre-requisites/Implementation Technologies

Technologies
1 . Network Routing & Switching
2 . Network Security
Hardware
1 . Cisco 1941 Route – 1
2 . Cisco Catalyst Switch – 1
3 . Cisco Packet Tracer 7.2.1
4 . Wire Shark (latest version)
5 . VMWare workstation or Oracle Virtual Box

Note: One kit will be provided per team for practice.

Project Development Lifecycle

Day Action plan Detailed Plan
Day 1 Project Analysis • Project description and overview
• Project limitations and case study
• Device Requirements analysis
Day 2 Understanding Architecture • Understanding OSI layered Architecture
• TCP/IP and OSI layers a comparison study
• Understanding Network topologies
Day 3 Understanding OSI layered Architecture • Network attack vector analysis
• Most common network-based attacks
• Split the attack surface basis OSI layered structure
Day 4 Identifying the possible mitigation technics • Importance and process of reconnaissance
• Identifying the possible mitigation technics
• Opensource and proprietary protocols used for network attack mitigation
Day 5 Implementation of project • Process of applying mitigation technics
• Implement the recommended actions for security
• Network penetration testing
Day 6 Testing and Documentation • Network penetration testing
• Study testing results after analysis
• Presentation and Documentation

Team Size and Price

Team Size Price for Team
4 4000

Note: A team can have maximum of 4 members.

Tech Coach

Md Shaifu Zama
Technical Trainer