Workshop on Network Security and Cyber Security - Telecontran Limited

Telecontran Limited

sales@telecontran.com

Workshop on Network Security and Cyber Security

5 DAYS

INSTRUCTOR LED WORKSHOP

“OUR COURSES CAN BE SPECIALLY TAILORED TO ADDRESS YOUR REQUIREMENT – TELECONTRAN”

Cyber Security & Network Security

COURSE OBJECTIVES

As more and more confidential information is stored and processed electronically, the risk of unauthorized access is on the rise. The Internet are fantastic places to converse, conduct business, do research, or simply relax and play a few games. But unfortunately, it’s also a place where some individuals would like to create havoc by committing fraud, identity theft, robbery, or to commit more serious crimes. Data breaches and attacks make protection critical. 

Telecontran’s 5-day Workshop on Network Security and Cyber Security takes a high-level look at how organisation can protect against such attacks by describing how to build, operate and maintain a comprehensive set of security controls. 

After successful completion of this 5-day workshop participants will be able to 

  • Define the architecture, design and management of the security of the organization. 
  • Analyze exposure to security threats 
  • Protect organization’s systems and data 
  • Deploy firewalls and data encryption to minimize threats 
  • Assess alternative user and host authentication mechanisms 
  • Manage risks originating from inside the organization and the internet.

COURSE CURRICULUM

  • IT professionals in the area of cyber security 
  • Security testers looking to understand new engineering approaches of testing 
  • Project managers, quality managers, cyber security managers, business analysts or IT directors looking for a comprehensive training in cyber security systems engineering 
  • Information technology professionals, web engineers, security analysts, policy analysts 
  • Technicians, operators, and maintenance personnel who are or will be working on network security projects 

Module 1: Security Basics 

  • Introduction to Network Security 
  • Internet Architecture and Vulnerable Security Aspect 
  • Importance of effective Network Security Strategy 
  • Cyber Trends 
  • Challenges in Cyber Security 

Module 2: Security Threats 

  • Types of threats 
  • Phishing and spear phishing 
  • Common Internet Attack Methods 
  • Eavesdropping / Viruses / Worms and Trojans 
  • IP Spoofing Attacks 
  • Denial of Service (Dos)

Module 3: Security Assessments 

Module 4: Host and Software Security 

  • Security Programming Techniques 
  • Trusted Computing Infrastructure (TCI) 
  • Low Level Software Security Attacks and Protection 
  • Web Security 
  • Secure Software Design Principles 
  • Cloud Security 
  • Data Security and Privacy (DAP) 
  • Wireless Network Security 
  • Mobile System Security 
  • Hardware Metering 
  • Fault Injection Attacks in Hardware 
  • Physical Hardware Attacks 
  • Secure Hardware Design for FPGAs 
  • Hardware Trojans 
  • Crypto Processor Design

Module 5: Network Security 

Module 6: Identity and Access Management 

  • Importance of Identity and Access Management 
  • Physical and Logical Access to Assets 
  • Access Subject Object and Access controls 
  • Identification Authentication and Authorization 
  • Biometrics—Characteristics 
  • FRR FAR CER 
  • Passwords / Tokens / Memory Cards and Smart Cards 
  • Directory Management 
  • SSO 
  • Access Control Models 
  • TACACS / TACACS+ 
  • DIAMETER 
  • Identity as Service 

Module 7: Cryptography 

  • Main Aspects of Cryptography 
  • Stream Ciphers / Block Ciphers 
  • Cryptography Algorithms 
  • Public Key Encryption (PKI) 
  • Hash Functions and Data Integrity 
  • Digital Signature 
  • GPG 
  • Digital Certificate 
  • Advance Cryptography 
  • Cryptographic Threats and Tools

Module 8: Operational Security 

Module 9: Incident Management 

  • Types of incidents 
  • Incident response and business continuity planning 
  • Incident Management Team (IMT) 
  • Incident Response Team (IRT) 
  • Incident recovery 
  • Incident handling response 
  • Incident management metrics 

 Module 10: Analyzing and Managing Risk 

  • Components of risk 
  • Basics of Risk Management

Module 11: Business Continuity and Disaster Recovery Plans 

  • Business Recovery and Facility and Supply  
  • Business continuity management 
  • Business resumption plan 
  • Disaster Recovery—Planning Design and Development 
  • Redundancy and Fault Tolerance 
  • Planning Design and Development 
  • Implementation, Testing, and Training 
  • Maintenance

Lab Sessions 

  • Demonstration of various tools for port scanning 
  • DoS attack 
  • Sniffer 
  • Firewall configuration. 

OUR HAPPY CLIENTS

WHAT OUR CLIENTS SAY ABOUT TELECONTRAN !!

“PLEASE FEEL FREE TO CONTACT FOR ANY FURTHER DETAILS AT SALES@TELECONTRAN.COM