You are on page 1of 4
i e s e t in e i] in t a r n fs i ok Ranol oie] (Wan ieeke} The Ultimate Network and Data Security Training System ‘And, that’s just the figure for @ random sample of 639 comparies in one country. The total loss due to network security lapses orobably cannot even be estimated. Moreover, these losses ore not due to ou'right theft so much os «© resul of networks being compromised, DoS attacks, virus contamination, and so on. All of which go to show that in today's world, comavier networks and the information stored on ther ore under constant threat, Todoy, dist computing is facing o growing number of network secur threats that have, in the last few years, evolved in viru and sophistication. The resul? Governments, corporate entities and individuols are increasingly focusing on securing ssets, In addition, there ore requlotory requirements for corporate entities to cerily the confidentiality of customer information with them. 1s ximoted tht today, 13% oto AR ESROURIIS one stor sonmmon company's IT budget is allocated for information security expenses ~ up from just 4% three yeors ogo. However, the industry suffers from a lack of suitably rained network ‘odministroiors to protect, detec and respond il to network security threats. Moreover, the ing community is constrained by the proper ‘platform’ which can vironment to work on cand data security is ted their IT Mo) is] COU) eee rtd Cae crs Cees ag SY LCL Te ate eee a bisavirsl) CMs CURLY ret Tt Conia Aue Dil The Benchmark i-SECURIT is a complete sysiem with two interconnected real life networks ~ the “usted Network" and the "Black Network”. These networks are isolated from the real world i.e. any corporate or campus LAN and the Internet. The i-SECURIT Central Control Unit {CCU} runs the Ceram °°'o%k services, administration and control methods. The Black Network users alam! fo compromise Cai® EE TUL the services by different attacks, such os Intrusions, Password Cracking, and Derial of Service, The [UES uae] trusted network users simultaneously work on, and are trained to deploy, suitable counter measures to keep network services running properly. The Benchmark i-SECURIT covers a large gamut of nelwork secur threats ond ils users can oblain hands-on expe Je voriety of network security issues and cryptography methods. T ‘ourse design allows the learner to read about o concept, witness a demonstration and then procice ils execution. This meets the siudy flow of beginners as well os indusity professionals. Through a single Benchmark i-SECURIT, you can connect up to 15 PCs, with one slot re the network administrator, ond can ster! working wilh os little as Iwo to th Developed with AU-KBC Research Centre, Anna University, Chennai Benchmark hos worked with experts in the field of network secuily and cryptography to create comprehensive learning moterial for conducting complete network security courses. The course material has been presented by pedagogy expers for ease of learning and long lerm retention. Users can follow the theory and go through the exercises for 0 complete understanding of the concepts through self study. This also makes it ideal for user paced learning Training Design Approach ) senchmark SECURIT Experiment Topics ore designed at ihre levels Level I: Running Network Services Network services fo be run and procedures to be adopted are discussed Level II: Attack the Trusted Network and shut down the services The methods used in attacking network services and shutting them down are explained in this level. The manual explains the same wilh step-by-siep instructions Level III: Training on Network Security Counter Measures ‘The user strained on Network administration and monitoring methods used to protect @ network from the cyber attacks ~ 08 experienced in Level los well as on diferent techniques such as eryplography, honeypols, ec., fo ensure dala and information security Network Security Fundamentals — An Introduction Networking basics = Seting up ond invoking nelwork elements hics and Legality Policy & practices that need 'o be followed in security practices including exploits, reporting methods, necessity of ethical hacking, social engineering practices, et. Network / System threats ‘Denial of Service (DoS} *Distibvted Denial of Service (2D0S) *Snifing ~ Packet / Mail snifing *Spoofing ~ IP MAC Web Vulnerabilities Web based password capturing, SQL injection [injection discovery, form validations), Buffer overtlow Demo *Honeypots — Active, anfi-iniusion technique Malware Trojans & Backdoors *Virus & AV methods Network Identification Enumeration - TCP ping, Ping sweep, ICMP ping, NULL Scan, Fast Scan, UDP port scan, Syn Stealth, Fin Stealth #05 detection Cryptography *Sjmmetric encryption scheme, Stream Cipher — RC4 Symmetric encryption scheme, Block Cipher ~ S-DES, 3-DES ‘Asymmetric encryption scheme, Block Cipher ~ RSA Hashing scheme ~ MDS *Block Cipher modes ~ ECB, CBC, CFB, OFB crypto techni servi usi *PKI ‘Authentication schemes — Different authentication schemes including password based authentication, IP Based Authentication and Challenge Handshoke Authentication Protocol (CHAP) Steganography Product Specifications Central Control Unit (CCU) = Network porls: 100Base-T ports ~ 2nos *One each to connect to switches of Trusted ond Black networks *R/45 interlace, auto negotiating * Remote login to configure the CCU © Up to 15 user logins = Power input: 220V AC, SOHz Ordering Information i-SECURIT — Cryptography & Network Security Assurance Laboratory, comprising (CCU: Ino ‘Manuel: 1 set (Technical manual and Experiment manval} ‘Network cable: 2 nos Windows - 2 machines Full Setup: No of PC’ fed - 14 nos Windows - 7 machines Linux system configuration: Redhat Linux ver Required Dependencies: Java Runtime Environ Ethereal Packet Snifer (for Windows) Internet Explorer 6.0 or above Macromedia Flash Player 6.0 or above Benchmark Electronic S: Perungudi, Chennai 600 096, India Ph: +91-44 2496 0227 Fox: +91-44 2496 1561 e-mail: nfo@benchmarkgroup.com Website: www. benckmarkeelectronics.com stems (P) Limited # 58, Electrical & Electronics Industrial Estate, ' Single Trainer solution for practicing several different Notwork Security & Cryplogrophy topics = Comprehensive set of exercises for different security threats and attacks + System threats — Identification & hacking Backdoors, Virus, Worms & Trojans + Web Volherabilties * Cryptography * Iniruson threats ~Snifing, Spooting, SQL injection Central Control Unit (CCU) to control and emlate real fe network under study + Remote login, Packet handling, routing, etc. 1 Variable network size ~ upto 7 nodes in each network (Trusted and Black) can be controlled 1 Comprehensive learning material wrilen by experts and presented by pedagogy experts 1 Instruction Manuals + Technical manual emphasizing practical aspects of network ond information security. Can be used os reference and for self study + Experiment manual ~ Step-by-step instructions covering all levels of experiments Linux with FTP server - 1 machine Linux with FTP server = 1 machine Linux 6 nos dows 2000 with SP or Windows XP with SP2 3 or ver 9.0 ver 1.5 {or above), WinPCop {for Windows) Nelscape Navigator 7 or above / Firefox 1.0 or above Authorised Dealer sore subject to chonge without notice. All trademarks ore the property of heir respective owners,

You might also like