IPv6 Security

Have Queries? Ask us +91 72592 22234

Course Overview


IPv6 Security training course provides a framework for IPv6 end-to-end security architecture and implementation issues. IPv6 security course provides the essential needs in managing a IPv6 network audit and vulnerability assessment. It provides a formal framework for finding and eliminating IPv6 network security threats, ensuring that no vulnerabilities are overlooked. IPv6 Security Training provides guidance for avoiding IPv6 security problems, identifying specific IPv6 security deficiencies, explore IPv6 vunerabilities and exploiting. IPv6 security class also details what commercial, freeware, and shareware tools are available, how they work, and how to use them. By following the procedures outlined in the course, you can pinpoint what individual parts of your IPv6 network need to be hardened and learn about IPv6 Security best practices.

Course Content


INTRODUCTION to IPv6

  • IPv6 in a nutshell
  • Comparing IPv4 and IPv6 IPv6 Header Format
  • IPv4 Compatibility
  • IPv6 Operation
  • IPv6 Addressing Architecture
  • ICMPv6 and Neighbor Discovery Protocol
  • Using DNS and DHCP with IPv6
  • Supporting Security and Mobility with IPv6
  • Routing in IPv6 Networks
  • Using IPv6 services
  • IPv6 operation and Architecture
  • Basic transition mechanisms
  • Tunneling protocols create new risks
  • IPv6 autoconfiguration

Introduction to IPv6 Security

  • IPv6 Security Essentials
  • IPv6 Protocol Security Vulnerabilities
  • IPv6 Internet Security
  • IPv6 Perimeter Security
  • Local Network Security
  • Hardening IPv6 Network Devices
  • Server and Host Security
  • IPsec and SSL Virtual Private Networks
  • Security for IPv6 Mobility
  • Securing the Transition Mechanisms
  • Security Monitoring
  • IPv6 Security Conclusions
  • Popular and Famous Attacks
  • Hacker Threats for IPv6
  • Neighbor Discovery
  • DHCPv6
  • Denial of Service
  • Neighbor Spoofing Attack
  • Neighbor Poisoning
  • ICMPv6 Attacks
  • Anycast Threat
  • Hacker Experience
  • IPv6 Security Mitigation Techniques
  • Large-Scale Internet Threats
  • Ingress/Egress Filtering
  • Securing BGP Sessions
  • IPv6 over MPLS Security
  • Prefix Delegation Threats
  • Multihoming Issues
  • IPv6 Perimeter Security
  • IPv6 Firewalls
  • Physical Security
  • Developing Security Policies, Assessments and Procedures
  • IPv6 Security Considerations and Recommendations
  • IPv6 Neighbor Discovery trust models and threats
  • Implementing Security for IPv6, Cisco Documentation
  • Security Implication of Mixed IPv4/IPv6 Network
  • IPv6 end-to-end security
  • Managing privacy extensions
  • IPsec, VPNs, IKE, PKI
  • IPv6 autoconfiguration

IPv6 and IPv4 Threat Comparison

  • Encryption
  • Digital Signatures
  • Public Key Infrastructure (PKI)
  • Dealing with Technology Evolution
  • Network Security Awareness
  • Best-Practice Evaluation
  • Threat Analysis Attacks with New Considerations in IPv6
  • Reconnaissance
  • Unauthorized Access
  • Header Manipulation and Fragmentation
  • Layer 3-Layer 4 Spoofing ARP and DHCP Attacks Broadcast Amplification     Attacks (smurf)
  • Routing Attacks
  • Viruses and Worms
  • IPv6 and IPv4 Threat Comparison
  • Translation, Transition, and Tunneling Mechanisms
  • Attacks with Strong IPv4 and IPv6
  • Similarities
  • Sniffing
  • Application Layer Attacks
  • Rogue Devices
  • Man-in-the-Middle Attacks
  • Flooding
  • IPv6 and IPv4 Threat Comparison
  • IPv6 Security Considerations
  • Authorization for Automatically Assigned Addresses and Configurations
  • Protection of IP Packets
  • Host Protection from Scanning and Attacks
  • Control of What Traffic is Exchanged with the Internet
  • Reconnaissance Tools

IPv6 Network Vulnerabilities and Attacks

  • Detailed analysis of IPv6 headers
  • Elimination of NAT
  • Denial of Service (DoS) and Distributed Denial of Service (DDoS)
  • Ethernet LAN Security
  • Frame Relay Network Security: Vulnerabilities and Mitigations
  • ICMP Attacks
  • IPv6 Spoofing
  • ICMP, ICMP Attack, Ping Attack, Smurf Attack, PING Flood, Ping of Death
  • Land Attack
  • Network Security at the Data Link Layer (Layer 2) of LAN
  • Network Security at the Network Layer (Layer 3: IP)
  • Network Security at the Transport Layer (Layer 4: TCP and UDP)
  • Pharming and Anti-pharming Mitigations and Technologies
  • Phishing and Anti-phishing Mitigations and Technologies
  • Port Scan Attack
  • Public-Key or Asymmetric Cryptography
  • RIP Routing Attacks
  • Smurf Attack and Fraggle Attack
  • SPAM and Anti-Spam Technologies
  • Spyware and Anti-Spyware Mitigations and Technologies
  • TCP Connecting Hijacking: MAN-In-The-Middle Attack
  • TCP SYN Attack
  • TCP/IP Network Vulnerability and Security
  • UDP Flood Attack
  • Widely Used Attack Tools
  • Virus and Antivirus Technologies
  • Top Information and Networking Threats

IPSec and IPv6

  • IPsec architecture
  • The Security Policy Database (SPD)
  • Security Association Database (SAD)
  • Peer Authorization Database (PAD)
  • SA and Key Management
  • IP Traffic Processing
  • AH and ESP Headers AH and ESP security protocols
  • Tunnel mode and transport mode
  • Security policy (SP)
  • Selector
  • Security Association (SA), Key exchange protocols
  • Security Protocols
  • AH and ESP
  • Security Parameter Index (SPI)
  • Sequence Number
  • Virtual Private Networks (VPNs)
  • Host-to-Host IPsec
  • Site-to-Site IPsec Configuration
  • Remote Access with IPsec
  • SSL VPNs
  • IP VPN Services
  • Attacking IPsec VPNs
  • Check Point VPN Security Issues
  • Microsoft PPTP
  • VPN Services Countermeasures

Security for IPv6 Mobility

  • Mobile IPv6 Operation
  • MIPv6 Messages
  • Threats Linked to MIPv6
  • Using IPsec with MIPv6
  • Filtering for MIPv6
  • Mitigating ICMPv6 threats
  • Other IPv6 Mobility Protocols

IPV6 Security Audit & Control

  • Host- and Network-based Intrusion Detection
  • Firewalls and Honeypots
  • Vulnerability Scanners
  • Computer Security Policies
  • Password Managemen
  • Incident Handling
  • Information Warfare
  • Encryption
  • VPN's, PKI, and PGP
  • Common Vulnerabilities in Wireless IPSec/VPN Deployments
  • Firewall Test, Port Scan, Spy Ware and Security Audit
  • Find Security Holes

IPv6 Risk Assessment and Auditing

  • Host and Network Based Intrusion Detection
  • Honeypots, Firewalls and Perimeter Protection
  • Security Policy
  • Information Warfare
  • Web Security
  • Network Fundamentals and IP Concepts and Behavior
  • Cisco Router Filters
  • Four Primary Threats for Perimeter Protection
  • PGP, Steganography
  • Anti-Viral Tools
  • Windows (2000, XP, NT, 98) IPv6 Security Administration and Auditing
  • IIS Security
  • Unix IPv6 Security

Firewalls, Perimeter Protection, and VPNs

  • IPv6 Stimulus/Response and Fragmentation
  • Complex IP Transports and Services
  • TCPdump, WINdump, Ethereal and Other Sniffers
  • Static Packet Filtering
  • Stateful Packet Filtering and Inspection
  • Proxies
  • Popular IPv6 Firewall Products
  • Implementing Security with Cisco Routers
  • Intrusion Detection
  • Centralized Logging
  • Firewall Log File Analysis
  • Log File Alerting
  • IPSec, SSL, and SSH
  • Designing a Secure Perimeter
  • Network and Host Based Auditing

Securing Unix/Linux and Microsoft Platforms in IPv6 Networks

  • Network-Based Attacks
  • Memory Attacks, Buffer Overflows
  • File System Attacks, Race Conditions
  • Trojan Horse Programs and Rootkits
  • Monitoring and Alerting Tools
  • Network Security Tools
  • Policies and Operations
  • DMZ: DeMilitarized Zone in Networks
  • Layered Defenses of Network and Information Security

IPv6 Security Considerations

  • ICMPv6 Protocol Protection
  • Scanning in IPv6
  • IPv6 extension header threats
  • IPv6 router header abuse
  • IPv6 fragmentation threats
  • ICMPv6 threats
  • Neighbor discovery threats
  • ND threat examples
  • Cryptographically Generated Addresses (CGA)
  • SEcure Neighbor Discovery (SEND)
  • SEND and CGA
  • Hardening IPv6 Network Devices
  • Threats Against Network Devices
  • Disabling Unnecessary Network Services
  • IPv6 Device Management
  • Threats Against Interior Routing Protocol
  • First-Hop Redundancy Protocol Security
  • Controlling Resources
  • QoS Threats
  • Server and Host Security
  • IPv6 Host Security
  • IPsec and SSL VPNs
  • Implementing Dual-Stack Security
  • Hacking the Tunnels
  • Attacking NAT-PT
  • IPv6 Latent Threats Against IPv4 Networks
  • Security Monitoring
  • Managing and Monitoring IPv6 Networks
  • Managing IPv6 Tunnels
  • Forensics Techniques
  • Using Intrusion Detection and Prevention Systems
  • Managing the Security Configuration
  • Changing Security Perimeter
  • Creating an IPv6 Security Policy
  • Securing the Transition Mechanisms
  • Understanding IPv4-to-IPv6 Transition Techniques
  • Consolidated List of Tonex's Recommendations

Customer Reviews


Thanks to Xpertised and the tutor who walked me through all the topics with Practical exposure which is helping me in my current project.
-Waseem

Course was quite helpful in terms of understanding of concepts and practicality. Its really a very friendly environment to learn. The timing were mutually chosen, as we both are working professional. I am quite satisfied with the course.
-Tanmoy

...more
Share:

For Batch Details
Call us at: +91 7259222234

Not sure? Consult Our Experts

Looking for a Training for

Myself

My Team/Organization

I agree to be contacted over mail or phone

or
Call us at: +91 7259222234