Price 3860 + VAT
DURATION 3 Days

Course Overview

The main goal of the Cyber security course is to cover some fundamentals cyber security topic, to provide insights into the modern security environment, the cyber threat landscape and attacker mentality, including how attackers work, what tools they use, what vulnerabilities they target and what they’re really after

Who should attend?

High level Managers, Presale Managers, IT Managers, QA and Technical Support.

Prerequisite:

Basic Knowledge of IP Networking

Course Outline:

Day 1

1. Introduction to Cyber Security
Hacking History
• Cyber Attacks Trends
• External and Internal threats
• Hackers Types
• Threats and attacks
• Security Criteria’s
• Threat Taxonomy Models summary

2. Basics of Security Management
• Security Layers
• Defending concept according OSI Layers
• Security modules and functionalities
• NAT- Network Address Translation
• Firewalls Types
• Network Access Control (NAC)
• IDS and IPS
• Encryption protocols: IPSec, TLS and SRTP
• Replay Attacks Protection
• Server Hardening

3. TCP/IP vulnerabilities 
• Network Layer (IP) services – 3rd Layer
• IP Header Structure
• MTU and Fragmentation process
• IP Addressing – issues and solutions
– ARP, DHCP, NAT
• Transportation Layers: TCP, UDP, SCTP

4. Introduction to Cryptography
• Public and Private keys
• Symmetric and Asymmetric encryption keys
• DES and Triple DES
• AES and RSA methods

5. MiTM challenge and confidentiality solutions
• What is TLS
• What is IPsec
• Applications over TLS and IPsec

6. Inspection and interception Tool – Hands-on
• Introduction to Wireshark
• Getting Started
• Capturing Packets
• Color Coding
• Sessions Filtering methods
• Inspecting Packets
• Network Topology studying
• MAC Addresses and manufacturers
• 3rd layer and IP Addresses analysis
• Open ports at 4th Layer Analysis
• Call flow analysis
• Traffic analysis and eavesdropping
• Live capture and real-time interception

Day 2

7. Firewall
• PFF, Proxy GW, Stateful Inspection
• Management menu
• Rules and policy

8.IPTables Firewall
• What is IPTables?
• Chains and Chain Policy
• Creating Rules and Rules Examples
• Connection States
• User Defined Chains
• Logging Events/Packets
• Advanced Examples
• Managing IPTables Firewall

9. Network and Vulnerabilities Scanning
• Basic Scanning Techniques
• Discovery Option
• Operation System Detection
• Nmap Script Engine
• Nmap GUI
• Vulnerabilities Information Sources
• Vulnerabilities Scanners10. Kali Linux
• What is Kali Linux?
• Some Kali Facts
• Installing Kali Linux
• Tools Categories
• Kali Desktop
• Kali Top Tools
• Kali Linux Alternatives11. Network Scanning – Hands-on Session
• NMAP – Networks Scanning for Topology analysis and network Mapping
• OpenVAS for vulnerabilities scanning and analysis
12. Services inspection – Hands-on
• Numbers Harvesting
• Conferences eavesdropping
• Password capture

13. Firewall – Hands-on Session
• FW Rules setting
• Denial of Service and DDoS attacks
• Port scanning and vulnerabilities
• Blocking scenarios

Day 3

14. Certificates and Authentication process
• Certificates and X.509 ITU-T Standard
• HTTP digest authentication
• Authentication scheme for a trusted domain
• Authentication Challenges

15. Penetration Testing
• What is Penetration Testing?
• Reasons for Pen Testing
• Hackers and Pen Testing
• Vulnerabilities
• What do we test
• Pen Testing Phases
• Types of Testing
• Areas of Penetration Tests
• References

16. Network Penetration – Hands-on Session

17. Wireless Network penetration- Hand-on Session
• John the Ripper/Crunch
• Brute-force search
• Brute-force attack
• Password cracking/ WPA2 crack

18. Security Summary
• Policy enforcement
• Organization Security personal and hierarchic
• Chief Information Security Officer – CISO
• Penetration Tester / Hacker
• Forensics
• Information Security Administrator: ISAD
• Information Security Auditor
• Application Development Security Expert
• InfoSec Systems Project Manager
• InfoSec Incident Expert
• Physical InfoSec Expert
• Behavior Analysis Expert and To-Do-List

19. Summary

Close Menu