Description: Objective: Attending students will learn:



Similar documents
JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Securing Cisco Network Devices (SND)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 5 Firewall Planning and Design


CS5008: Internet Computing

IINS Implementing Cisco Network Security 3.0 (IINS)

Implementing Cisco IOS Network Security

INFORMATION SECURITY TRAINING CATALOG (2015)

Asheville-Buncombe Technical Community College Department of Networking Technology. Course Outline

Network Security Fundamentals

Högskolan i Halmstad Sektionen för Informationsvetenskap, Data- Och Elektroteknik (IDÉ) Ola Lundh. Name (in block letters) :

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Network Security and Firewall 1

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

Firewalls, Tunnels, and Network Intrusion Detection

Build Your Own Security Lab

APNIC elearning: Network Security Fundamentals. 20 March :30 pm Brisbane Time (GMT+10)

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill

CYBERTRON NETWORK SOLUTIONS

ACADEMIA LOCAL CISCO UCV-MARACAY CONTENIDO DE CURSO CURRICULUM CCNA. SEGURIDAD CCNA SECURITY. VERSION 1.0

Chapter 8 Security Pt 2

The Information Security Problem

Network Security Administrator

NEW YORK INSTITUTE OF TECHNOLOGY School of Engineering and Technology Department of Computer Science Old Westbury Campus

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

SCP - Strategic Infrastructure Security

Ethical Hacking Course Layout

Information Technology Career Cluster Introduction to Cybersecurity Course Number:

Reverse Shells Enable Attackers To Operate From Your Network. Richard Hammer August 2006

NETWORK SECURITY (W/LAB) Course Syllabus

CS 356 Lecture 17 and 18 Intrusion Detection. Spring 2013

Linux Network Security

Firewalls, Tunnels, and Network Intrusion Detection. Firewalls

Chapter 9 Firewalls and Intrusion Prevention Systems

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

Internet Firewall CSIS Internet Firewall. Spring 2012 CSIS net13 1. Firewalls. Stateless Packet Filtering

Tim Bovles WILEY. Wiley Publishing, Inc.

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Virtual private network. Network security protocols VPN VPN. Instead of a dedicated data link Packets securely sent over a shared network Internet VPN

TIME SCHEDULE. 1 Introduction to Computer Security & Cryptography 13

How NETGEAR ProSecure UTM Helps Small Businesses Meet PCI Requirements

CRYPTUS DIPLOMA IN IT SECURITY

Network/Internet Forensic and Intrusion Log Analysis

Network Attacks and Defenses

Cisco Certified Security Professional (CCSP)

McAfee Firewall Enterprise System Administration Intel Security Education Services Administration Course

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Jort Kollerie SonicWALL

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Security + Certification (ITSY 1076) Syllabus

Comprehensive Malware Detection with SecurityCenter Continuous View and Nessus. February 3, 2015 (Revision 4)

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

Managed Intrusion, Detection, & Prevention Services (MIDPS) Why Sorting Solutions? Why ProtectPoint?

Firewall Firewall August, 2003

Penetration Testing with Kali Linux

BlackRidge Technology Transport Access Control: Overview

Section 12 MUST BE COMPLETED BY: 4/22

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

Firewalls. Chapter 3

Network Security. Protective and Dependable. 52 Network Security. UTM Content Security Gateway CS-2000

CYBER SECURITY. Overview This event provides recognition for FBLA members who understand security needs for technology.

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

General Network Security

FAQ (Frequently Asked Questions)

The IINS acronym to this exam will remain but the title will change slightly, removing IOS from the title, making the new title

SonicOS 5.9 One Touch Configuration Guide

CSCI 4250/6250 Fall 2015 Computer and Networks Security

Appendix A: Configuring Firewalls for a VPN Server Running Windows Server 2003

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

Malicious Network Traffic Analysis

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

CISCO IOS NETWORK SECURITY (IINS)

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

INFORMATION SECURITY TRAINING

Network Incident Report

Linux Operating System Security

Course Title: Penetration Testing: Security Analysis

Implementing Cisco IOS Network Security v2.0 (IINS)

Eleventh Hour Security+

2016 TÜBİTAK BİLGEM Cyber Security Institute

Chapter 12. Security Policy Life Cycle. Network Security 8/19/2010. Network Security

Information Security. Training

Introduction of Intrusion Detection Systems

Certified Ethical Hacker (CEH)

INFORMATION SECURITY TRAINING CATALOG (2016)

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

Computer Security. Principles and Practice. Second Edition. Amp Kumar Bhattacharjee. Lawrie Brown. Mick Bauer. William Stailings

Security in IPv6. Basic Security Requirements and Techniques. Confidentiality. Integrity

GL254 - RED HAT ENTERPRISE LINUX SYSTEMS ADMINISTRATION III

Networking for Caribbean Development

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Computer Security CS 426 Lecture 36. CS426 Fall 2010/Lecture 36 1

Importance of Web Application Firewall Technology for Protecting Web-based Resources

Transcription:

Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of credit card and personal information records being posted on the Internet. The Internet Storm Center reports an average of over 700,000 detected intrusion attempts daily and thats only the events they catch! There is no question that Cyber Security is a necessity and an increasing global concern, the challenge is where to start the daunting task of securing your infrastructure, training your end users and preparing your organization to face the year ahead. Introduction to Cyber Security is the foundational training for all users whether management, IT, end user or programmer. Equip your team with the up to date knowledge of threats we all face and the hands-on skills to address them. With information culminated from the most trusted sources; CERT, NIST, DHS and others, this course presents an objective, complete, and cutting edge view of our current environment as well as a vision of the near future of Cyber Security. Objective: Attending students will learn: Overview of the Hacking Cycle Phases of Network Reconnaissance Use and Methodology of Network Scanning Tools DNS Analysis and Manipulation Malware Types Defensive Postures Security Appliance Types and Uses Defense in Depth Model Access Control Mechanisms Authentication Protocol Types and Uses Encryption Protocol Types and Uses VPN Protocol Types and Uses ICS Page 1/6 www.skyline-ats.com

Prerequisites: You should possess knowledge of the following: There are no prerequisites, however a basic understanding of computer and network terminology is recommended Who Should Attend: IT Administrators seeking an understanding of security threats and basic mitigation controls Database Administrators desiring an increased security awareness Managers of network resources who want an understanding of the current threat landscape End Users needing a heightened awareness of Cyber Security ICS Page 2/6 www.skyline-ats.com

Outline: The Current Threat Landscape Prevalence of Common Threats Cost of Malware and Breaches Examples of Attack Time lines Attacker Goals Top 10 Threats The Hacking Cycle-Enumeration Reconnaissance Passive Information Gathering tools and techniques, Whois Social Engineering Scanning Ping and other ICMP based Scanning TCP Syn and Port Scans UDP Host and Port Scans ICMP Message Quoting Operating System Fingerprinting, Baselines and Operating System Host Hardening TCP/IP Protocol Exploitation DNS DHCP IPv4 and IPv6 Header Review IPv4 and IPv6 Manipulation and Analysis TCP and UDP Overview and Analysis DNS Record Types MX, NS, SOA, A, AAAA, CNAME, PTR, NAPTR, SRV Host DNS Resolver Files and Functions DNS Server Types Caching, Forwarding, Authoritative DNS Zone Transfers DNS Security (DNSSEC) DHCP Message Types ICS Page 3/6 www.skyline-ats.com

DHCP Options, Usage and Security Introduction to Cyber Security ICMP Malware ICMP Message Types ICMP Usage and Security Virus Types Armored, Stealth, Polymorphic, Retro, Macro, Multipartite, Resident, NonResident Worms, Trojan Horses, Rootkits, Illicit Servers, Botnets Spyware Keyloggers, Screen Capture, Cookie Grabbing, Browser High-jacking Anti-virus Software Disk Scanning and Definitions Memory-Resident Scanners Heuristics and Execution Prevention Boot-time Scanning Host Based Intrusion Detection Inoculation (Base-lining) Behavior Based and Heuristic Detection Spyware Protection Anti-Spyware Software Private Browsing and Browser Plug-ins Private Data Storage and Deletion Defense-In-Depth Ingress/Egress Routers Layer 3 and Layer 4 Filtering, Access Control Lists Stateful Firewalls Reflexive ACLs, Content Inspection, Flood Mitigation, Maintence Application Layer Proxy or Firewalls Content Filtering, Anti-Virus, Anti-Spam, Caching and NAT Intrusion Detection Systems ICS Page 4/6 www.skyline-ats.com

Packet Capture and Analysis, Active vs. Passive, Sensor Placement, Signatures HoneyPots Access Control Encryption Lab Outline Physical Controls Perimeters, Barriers, Surveillance Access Control Models Mandatory, Rule and Role Based, Discretionary Authentication Factors Types Passwords and Password Cracking Authentication Protocols Confidentiality, Integrity, Authentication and Non-Repudiation Symmetric and Asymmetric Ciphers Hashing Algorithms X.509 Certificates The Public Key Infrastructure PGP SSL/TLS Versions Handshake Certificate Validation SSH Message Encryption Forward and Reverse Tunnels Lab 1 - Internet Research and Information Gathering Lab 2 - Using Whois, NSLookup, and Dig for DNS Reconnasiance Lab 3 - Identifying Social Engineering Attempts Lab 4 - Observing Network Scanning with Wireshark Lab 5 - Using Netstat and other utilities to base line a Windows System Lab 6 - Examining Malformed Packets with Wireshark Lab 7- Capture and Analyze TCP and UDP Conversations Lab 8 - Capture and Analyze the DNS Query and Response Process Lab 9 - Explore an DHCP Scope. Observe the DHCP Process Lab 10 - Analyze ICMP Messages and Identify Source Operating Systems Lab 11 - Internet Research and Information Gathering ICS Page 5/6 www.skyline-ats.com

Powered by TCPDF (www.tcpdf.org) Introduction to Cyber Security Lab 12 - Install and Configure Anti-Virus, Scan an Infected system Lab 13 - Analyze ACLs, Capture Packets designed to evade the ACLs Lab 14 - Deploy and Configure a Personal Fire wall - Analyze Firewall Logs Lab 15 - Analyze and IDS setup. Read and Interpret IDS logs. Lab 16 - Discussion- common physical access controls mechanisms and how they are defeated Lab 17 - Use password cracking tools to reveal weak passwords Lab 18 - Capture and Inspect encrypted traffic Lab 19 - Hash files using MD-5, SHA-1 and SHA-2, compare hash outputs Lab 20 - Examine an X.509v3 Certificate - View Trusted Root CAs in various Browsers - Observe OCSP Validation of a Certificate Lab 21-Create a PGP Certificate - Sign and Encrypt and Email using PGP Lab 22 -Capture and Analyze an SSL Session - Identify the Certificate and Issuing Authority Lab 23 -Create and SSH Tunnel ICS Page 6/6 www.skyline-ats.com