Train together, save more! 10% off individual registration, 20% off for pairs.
×
Log in
Or create your account
You have just added to your selection
Your cart is empty, See our trainings

Description

IPv6 responds to the exhaustion of the stock of IPv4 addresses. However, its implementation poses security problems. This training allows you to know the vulnerabilities of IPv6 at different levels, the appropriate concrete solutions and the good practices related to the implementation of the network.

Who is this training for ?

For whom ?

Network/security engineers responsible for the study or deployment of an IPv6 network.

Prerequisites

Training objectives

  • Know the vulnerability issues related to IPv6 implementation Implement appropriate security solutions Apply good security practices
  • Training program

      • The IPSec protocol.
      • Host authentication with AH.
      • Data confidentiality with ESP.
      • The mechanism of IKE key exchange.
      • Practical work Implementation of IPSec in transport mode between two hosts.
      • Deployment of an IPsec tunnel between two routers.
      • Frequent bad practices.
      • Problems linked to bad practices.
      • Denial of service (DOS) attacks.
      • The techniques of "Man In The Middle".
      • Practical work Highlighting problems, followed by implementation of solutions on switches and machines.
      • Address spoofing.
      • The use of ICMP redirect messages.
      • The proper use of ICMPv6 filtering.
      • Control of interface identifiers.
      • Anycast addresses.
      • IPv6 and extensions.
      • Practical work Highlighting the risks, followed by implementation of solutions on switches and machines.
      • DHCPv6: risks linked to its use.
      • DNS and IPv6: best practices.
      • Demonstration Illustrations of the risks linked to the use of DHCPv6 .
      • Discussions on best practices related to DNS and IPv6.
      • Controlling your interconnection.
      • Believing yourself to be safe from IPv6.
      • Demonstration Illustration by examples of the risks associated with tunnels.
      • The use of ULA type addresses.
      • Traffic filtering.
      • Practical work Implementation of filtering on routers.
      • Discussions on best practices.
      • Controlling addresses and listening ports.
      • Controlling subscriptions to multicast groups.
      • Practical work Analysis under Windows and Unix.
      • Implementation of filtering on machines.
    • 870
    • 14 h

    Submit your review

    Translated By Google Translate