Cisco Training Courses

Cisco Training Courses

Insoft has been serving IT industry with authorized Cisco courses training, since 2010. Find all the relevant information on Cisco training on this page.

View More

Cisco Certifications

Experience a blended learning approach that combines the best of instructor-led training and self-paced e-learning to help you prepare for your certification exam.

View More

Cisco Learning Credits

Cisco Learning Credits (CLCs) are prepaid training vouchers redeemed directly with Cisco that make planning for your success easier when purchasing Cisco products and services.

Have CLCs and want to redeem them?

Cisco Continuing Education

The Cisco Continuing Education Program offers all active certification holders flexible options to recertify by completing a variety of eligible training items.

View More

Cisco U

Cisco U. is customized to achieve your learning needs as this provides learning paths that includes wide range of topics, including CCNA, Cloud and Network Automation Essentials.

Browse Catalogue

Cisco Business Enablement

The Cisco Business Enablement Partner Program focuses on sharpening the business skills of Cisco Channel Partners and customers.

View More

Fortinet Technical Certifications

Insoft Services´ training capabilities rely on the excellence of our exclusive Fortinet Certified Trainers (FCT). We are dedicated to providing high-quality training to Fortinet Customers and Partners.

View More

Fortinet Technical Courses

Insoft is recognised as Fortinet Authorized Training Center in selected locations across EMEA.

View More

ATC Status

Check our ATC Status across selected countries in Europe.

View More

Fortinet Services Packages

Insoft Services has developed a specific solution to streamline and simplify the process of installing or migrating to Fortinet Products.

Browse Packages

Prepforce Bootcamp

The only comprehensive source available today to prepare for Fortinet NSE 8 certification globally.

View More

Microsoft Training

Insoft Services provides Microsoft training in EMEAR. We provide Microsoft technical training and certification courses that are led by world-class instructors.

View More

Technical Training

The evolution of Extreme Networks Technical Training provides a comprehensive progressive pathway from Associate to Professional accreditation.

View More

ATP Accreditation

As an authorised training partner (ATP), Insoft Services ensures that you receive the highest standards of education available.

View More

What we do

Through our global presence and partner ecosystem, we provide strategic IT consulting services to align IT services with customers' business goals.

View More

 

We are pleased to launch pre-scoped Enterprise Networking Consulting Packages, our ready-made solutions, tailored to ensure efficiency and cost containment.

 

View More

 

We specialize in the deployment of vendor-specific automation tools as well as open-source and vendor-independent solutions, that can be tuned in accordance with the business needs of a specific organization.

 

View More

 

We provide comprehensive IoT consultancy, deployment and support solutions for businesses that want to launch or improve their use of connected technologies.

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More

 

In a world where technologies are evolving rapidly, every company - business needs a partner to rely on and trust for the smooth and secure operation of its network infrastructure.

 

View More
Cisco Training Courses

 

We provide the highest level of expertise on Cisco consultancy services, that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

We provide the highest level of expertise on Fortinet consultancy services that target audits of your current network and implementing updates for improved operational performance, secure data and compliant systems.

View More

 

Our team can help enterprises, get the most value from Extreme products and services following our predefined value-added packages or custom ones that fits business needs.

 

View More

 

TXOne Networks provides cybersecurity solutions that ensure the reliability and safety of ICS and OT environments through the OT zero trust methodology protecting assets for their entire life cycle.

 

View More

About Us

Our training portfolio includes a wide range of IT training from IP providers, including Cisco, Extreme Networks, Fortinet, Microsoft, to name a few, in EMEA.

View More

Enterprise Network Security Posture Assessment

Enterprise-Network-Security-Posture-Assessment

Enterprise Network Security Posture Assessment

19 May 2020

What is that one thing within an enterprise that could be considered the nerve system? I think it’s the network. Your enterprise network facilitates communication and the sharing of information, it also allows everyone in the organization to access tools they need to execute on their day to day tasks.

For such a critical and sensitive resource, your organization must ensure data integrity by making sure no one gains unauthorized access. That’s where network security; specifically network penetration testing can help. In this article, I aim to guide you through the whole network penetration testing and/or vulnerability assessment process.

What is a Network Security Assessment?

Network Security Assessment is aimed at identifying vulnerabilities in networks; hosts, servers, routers, and switches that can be exploited by hackers. This typically involves one doing what a bad actor would do; identify and exploit security flaws. After identification, one has to fix the network security flaws. Network Security should be a top priority for all organizations and security assessments should be conducted regularly.

A network security assessment will reveal existing real-world opportunities for malicious actors to be able to gain unlawful access to sensitive data or even completely take-over systems and consequently compromise systems and networks.

Some of the common system vulnerabilities include misconfigured software, firewalls, and operating systems, outdated software and operating systems, insecure protocols and unnecessarily open ports.

Types of Network Security Assessments:

  • Vulnerability Scanning: This uses automated systems (such as Nessus, ISS Internet Scanner, QualysGuard, or eEye Retina) with minimal hands-on qualification and assessment of vulnerabilities.
  • Penetration Testing: This involves more offensive external, internal and physical/social attacks. This tests the true strength of your network. Although Penetration Testing Software attempts to penetrate your network, it is not running an active code that could be harmful. Implementing a Pen Test is secure as long as the vulnerability is kept within the scope of the assessment.

Network Security Assessment Methodologies

  • Black Box Assessment: According to this method, the security team tries to find ways to get into the company’s network ‘from the outside.’ What can they see in this case? Public IP addresses, the external interface of a firewall, systems located in the demilitarized zone (DMZ), etc. No administrator privileges, no access to databases are provided to penetration testers.
  • White Box Assessment: With this approach, the security team tests the network ‘from the inside,’ having all the privileges of the network authorized users. The security engineers have administrator access to all the servers inside the network.
  • Gray Box Assessment: This approach encompasses both methods above but is more comparable to black-box vulnerability assessment. Security engineers conduct Gray box vulnerability assessments if they get some information on the organization’s network, such as user login details, but they don’t get access to the entire network.

Stages of Network Security Assessment

To get a clearer understanding of the assessment process, let us look at the six common stages that you go through on every assessment.

Step 1. Planning and Defining the Scope

The network security assessment team deliberates with the customer on the assessment objectives and the scope of work. For instance, security engineers can be tasked with performing vulnerability assessment tests on an enterprise’s internal subnetworks and help with meeting PCI DSS compliance standards.

Step 2. Intelligence Gathering

This stage is also referred to as reconnaissance. It involves the discovery of all accessible endpoints and the services or applications they are running. The endpoints include both physical and virtual components, firewalls, antivirus software, intrusion detection and prevention systems. The team identifies whether the network has open ports or services that shouldn’t be running. A keen look is also taken on the endpoint configurations, including any deployed SIEM products.

Step 3. Scanning and Enumeration

In this stage, the security team uses tools such as Nmap, Nessus, and Nikto to scan actively against target clients to fingerprint running services and operating systems. “Footprinting” of the network is carried out with the use of automated tools, such as Nmap, a network analysis tool.

They also perform enumeration; just looking at items and digging into them to see if we can find anything of value. Say there is a web server running on port 80, it is seen that port 80 is open and it’s running something like Apache 1.2 which will be really really outdated. The team conducts research to find out if Apache 1.2 has any exploits for it etc, that falls within the enumeration portion.

Step 4. Exploitation

After getting done with information gathering, scanning and enumeration, the team moves into the gaining access portion. They can attempt to escalate privileges, pivot and exploit the trust relationship between the compromised and other servers. They will run an exploit against the client or against a vulnerable service or whatever it may be to try and get access into a machine or into a network or environment etc. After gaining access, the team also works to maintain that access, for instance, if they are logged out due to a machine being powered off etc.

Step 5. Covering tracks

And then lastly there is the covering of tracks, the team deletes any generated logs, uploaded malware and any accounts that were created during the exploitation, this is really important.

Step 6. Reporting and Documentation

Finally, the team prepares an actionable report on discovered vulnerabilities in the enterprise network. This is backed up with evidence and a description of issues, targets affected and how exploiting those issues may affect the security posture of the enterprise. Recommendations on how to resolve and patch the vulnerabilities are also given.

How Can One Get Started?

Some of the base skills needed to get started with network penetration testing include Kali Linux, Networking; OSI Model, subnetting and common network protocols, Scripting skills; Python and Bash/Shell, Metasploit, Burp Suite, Nessus, Active Directory, Wireless network hacking and OWASP. More specifically;

  • Develop proficiency with basic computer skills, know your way around a Windows or Linux machine. Develop proficiency with installing operating systems, creating bootable USB drives and how to boot from a USB drive. You additionally need to learn about what BIOS and UEFI are.
  • Start playing with Linux and Kali. You really need to learn about Linux if you intend to get into hacking exploits, Windows OS is very limiting, therefore there’s no other way around it, learn Linux! Learn how to find out your IP Address, learn about the Linux Filesystem, learn how to create a User Account, learn about root, Sudo and the Apt Package Manager.
  • Learn the fundamentals of network infrastructure and security. This lays out the very foundation of cybersecurity. You must develop proficiency with network fundamentals such as the most used network protocols, learn about the OSI Model, what a Switch is, what a Firewall is; learn about Firewall Rules and policies, how to control traffic in your own network and how to block certain devices from going out to the Internet Intrusion, TCP and UDP, VLAN’s, IP Addresses and Subnetting.
  • Learn about windows servers and domains. Each and every company will run some kind of Active Directory or other authentication, Windows still being the most dominant. You have to have at least a basic understanding of how Domain Authentication works and how user accounts and computers are connected with a Domain Controller.
  • In addition, with the unabated increase in the adoption of Cloud technologies in enterprise network environments, developing proficiency with Cloud Computing and security in the cloud expertise will be an added advantage.

To learn more about CyberSecurity career pathways, make sense of what roles lead to which paths and what skills or certifications are applicable, using an easy to use graphical visualization.

How Insoft Services can help

It’s hard to manage Cyber Security risk without having a full picture of your enterprises vulnerabilities. That’s why a network security assessment is so important. It helps you develop a map of your IT infrastructure that shows you where all your weak spots are.

It is best to have a 3rd Party to run the Network Security Assessment and help implement necessary changes. Drawing from our extensive experience in Cyber Security training, not only will we provide you with the right Network Security Assessment, but we can also consult on and implement any changes that need to be made.

More Blogs for you:

Network Automation Developer
Insoft Services
Brunner has an extensive background in Telecommunications and Information engineering. He has previously worked with leading organizations in the electronic, software and Internet Service Provider space within their respective regions. He is an innovative thinker with a demonstrated history of working on Network Automation scripting and workflow orchestration projects. He has accumulated experience working with Python programming and Network engineering. He's also an active member of both the Cisco and Fortinet Developer networks.

  • Recent Blogs

  • Relevant Blogs

  • No Comments

    Comments are closed.