Cyber Fundamentals including Hands-on training

Course Overview:

The main goal of the Cyber security course is to cover some fundamentals cyber security topic, to provide insights into the modern security environment, the cyber threat landscape and attacker mentality, including how attackers work, what tools they use, what vulnerabilities they target and what they’re really after


Who should attend:

High level Managers, Presale Managers, IT Managers, QA and Technical Support.


Prerequisite:

Basic Knowledge of IP Networking


Course Outline:
Day 1

1. Introduction to Cyber Security
  Hacking History
• Cyber Attacks Trends
• External and Internal threats
• Hackers Types
• Threats and attacks
• Security Criteria’s
• Threat Taxonomy Models summary

2. Basics of Security Management
• Security Layers
• Defending concept according OSI Layers
• Security modules and functionalities
• NAT- Network Address Translation
• Firewalls Types
• Network Access Control (NAC)
• IDS and IPS
• Encryption protocols: IPSec, TLS and SRTP
• Replay Attacks Protection
• Server Hardening

3. TCP/IP vulnerabilities 
• Network Layer (IP) services – 3rd Layer
• IP Header Structure
• MTU and Fragmentation process
• IP Addressing – issues and solutions
- ARP, DHCP, NAT
• Transportation Layers: TCP, UDP, SCTP

4. Introduction to Cryptography
• Public and Private keys
• Symmetric and Asymmetric encryption keys
• DES and Triple DES
• AES and RSA methods

5. MiTM challenge and confidentiality solutions
• What is TLS
• What is IPsec
• Applications over TLS and IPsec

6. Inspection and interception Tool – Hands-on
• Introduction to Wireshark
• Getting Started
• Capturing Packets
• Color Coding
• Sessions Filtering methods
• Inspecting Packets
• Network Topology studying
• MAC Addresses and manufacturers
• 3rd layer and IP Addresses analysis
• Open ports at 4th Layer Analysis
• Call flow analysis
• Traffic analysis and eavesdropping
• Live capture and real-time interception

Day 2

7. Firewall

• PFF, Proxy GW, Stateful Inspection
• Management menu
• Rules and policy

8.IPTables Firewall
• What is IPTables?
• Chains and Chain Policy
• Creating Rules and Rules Examples
• Connection States
• User Defined Chains
• Logging Events/Packets
• Advanced Examples
• Managing IPTables Firewall
9. Network and Vulnerabilities Scanning
• Basic Scanning Techniques
• Discovery Option
• Operation System Detection
• Nmap Script Engine
• Nmap GUI
• Vulnerabilities Information Sources
• Vulnerabilities Scanners

10. Kali Linux
• What is Kali Linux?
• Some Kali Facts
• Installing Kali Linux
• Tools Categories
• Kali Desktop
• Kali Top Tools
• Kali Linux Alternatives

11. Network Scanning - Hands-on Session
• NMAP - Networks Scanning for Topology analysis and network Mapping
• OpenVAS for vulnerabilities scanning and analysis
12. Services inspection – Hands-on
• Numbers Harvesting
• Conferences eavesdropping
• Password capture


13. Firewall - Hands-on Session
• FW Rules setting
• Denial of Service and DDoS attacks
• Port scanning and vulnerabilities
• Blocking scenarios 

Day 3

14. Certificates and Authentication process

• Certificates and X.509 ITU-T Standard
• HTTP digest authentication
• Authentication scheme for a trusted domain
• Authentication Challenges

15. Penetration Testing
• What is Penetration Testing?
• Reasons for Pen Testing
• Hackers and Pen Testing
• Vulnerabilities
• What do we test
• Pen Testing Phases
• Types of Testing
• Areas of Penetration Tests
• References

16. Network Penetration - Hands-on Session

17. Wireless Network penetration- Hand-on Session
• John the Ripper/Crunch
• Brute-force search
• Brute-force attack
• Password cracking/ WPA2 crack

18. Security Summary
• Policy enforcement
• Organization Security personal and hierarchic
• Chief Information Security Officer – CISO
• Penetration Tester / Hacker
• Forensics
• Information Security Administrator: ISAD
• Information Security Auditor
• Application Development Security Expert
• InfoSec Systems Project Manager
• InfoSec Incident Expert
• Physical InfoSec Expert
• Behavior Analysis Expert and To-Do-List

19. Summary

Course Registration Form


Course Title
Invalid Input

or Key in Your Own Title
Invalid Input

Course Start Date

Invalid Input

Sponsorship (*)
Invalid Input


Contact Person


Salutation(*)
Invalid Input

Name(*)
Invalid Input

Designation/ Department/ Division(*)
Invalid Input

Company(*)
Invalid Input

Billing Address (*)
Invalid Input

Street Address

(*)
Invalid Input

Street Address Line 2

City(*)
Invalid Input

State / Province(*)
Invalid Input

Postal / Zip Code(*)
Invalid Input

Telephone(*)
Invalid Input

Fax
Invalid Input

Email Address (*)
Invalid Input


Participant Details


Participant Salution 1
Invalid Input

Participant Name1
Invalid Input

Designation/ Department/ Division
Invalid Input

Telephone
Invalid Input

Fax
Invalid Input

Email Address
Invalid Input

Dietary Requirement
Invalid Input


Participant Salution 2
Invalid Input

Participant Name2
Invalid Input

Designation/ Department/ Division
Invalid Input

Telephone
Invalid Input

Fax
Invalid Input

Email Address
Invalid Input

Dietary Requirement
Invalid Input


Participant Salution 3
Invalid Input

Participant Name 3
Invalid Input

Designation/ Department/ Division
Invalid Input

Telephone
Invalid Input

Fax
Invalid Input

Email Address
Invalid Input

Dietary Requirement
Invalid Input


Payment Method(*)
Invalid Input

Cheque number
Invalid Input

PO Number
Invalid Input

How did you get to know about this programme?(*)
Invalid Input

Terms and Conditions
Invalid Input

Invalid Input