Workshop on Network Security and Cyber Security
5 DAYS
INSTRUCTOR LED WORKSHOP
“OUR COURSES CAN BE SPECIALLY TAILORED TO ADDRESS YOUR REQUIREMENT – TELECONTRAN”
COURSE OBJECTIVES
As more and more confidential information is stored and processed electronically, the risk of unauthorized access is on the rise. The Internet are fantastic places to converse, conduct business, do research, or simply relax and play a few games. But unfortunately, it’s also a place where some individuals would like to create havoc by committing fraud, identity theft, robbery, or to commit more serious crimes. Data breaches and attacks make protection critical.
Telecontran’s 5-day Workshop on Network Security and Cyber Security takes a high-level look at how organisation can protect against such attacks by describing how to build, operate and maintain a comprehensive set of security controls.
After successful completion of this 5-day workshop participants will be able to
- Define the architecture, design and management of the security of the organization.
- Analyze exposure to security threats
- Protect organization’s systems and data
- Deploy firewalls and data encryption to minimize threats
- Assess alternative user and host authentication mechanisms
- Manage risks originating from inside the organization and the internet.
COURSE CURRICULUM
- IT professionals in the area of cyber security
- Security testers looking to understand new engineering approaches of testing
- Project managers, quality managers, cyber security managers, business analysts or IT directors looking for a comprehensive training in cyber security systems engineering
- Information technology professionals, web engineers, security analysts, policy analysts
- Technicians, operators, and maintenance personnel who are or will be working on network security projects
Module 1: Security Basics
- Introduction to Network Security
- Internet Architecture and Vulnerable Security Aspect
- Importance of effective Network Security Strategy
- Cyber Trends
- Challenges in Cyber Security
Module 2: Security Threats
- Types of threats
- Phishing and spear phishing
- Common Internet Attack Methods
- Eavesdropping / Viruses / Worms and Trojans
- IP Spoofing Attacks
- Denial of Service (Dos)
Module 3: Security Assessments
Module 4: Host and Software Security
- Security Programming Techniques
- Trusted Computing Infrastructure (TCI)
- Low Level Software Security Attacks and Protection
- Web Security
- Secure Software Design Principles
- Cloud Security
- Data Security and Privacy (DAP)
- Wireless Network Security
- Mobile System Security
- Hardware Metering
- Fault Injection Attacks in Hardware
- Physical Hardware Attacks
- Secure Hardware Design for FPGAs
- Hardware Trojans
- Crypto Processor Design
Module 5: Network Security
Module 6: Identity and Access Management
- Importance of Identity and Access Management
- Physical and Logical Access to Assets
- Access Subject Object and Access controls
- Identification Authentication and Authorization
- Biometrics—Characteristics
- FRR FAR CER
- Passwords / Tokens / Memory Cards and Smart Cards
- Directory Management
- SSO
- Access Control Models
- TACACS / TACACS+
- DIAMETER
- Identity as Service
Module 7: Cryptography
- Main Aspects of Cryptography
- Stream Ciphers / Block Ciphers
- Cryptography Algorithms
- Public Key Encryption (PKI)
- Hash Functions and Data Integrity
- Digital Signature
- GPG
- Digital Certificate
- Advance Cryptography
- Cryptographic Threats and Tools
Module 8: Operational Security
Module 9: Incident Management
- Types of incidents
- Incident response and business continuity planning
- Incident Management Team (IMT)
- Incident Response Team (IRT)
- Incident recovery
- Incident handling response
- Incident management metrics
Module 10: Analyzing and Managing Risk
- Components of risk
- Basics of Risk Management
Module 11: Business Continuity and Disaster Recovery Plans
- Business Recovery and Facility and Supply
- Business continuity management
- Business resumption plan
- Disaster Recovery—Planning Design and Development
- Redundancy and Fault Tolerance
- Planning Design and Development
- Implementation, Testing, and Training
- Maintenance
Lab Sessions
- Demonstration of various tools for port scanning
- DoS attack
- Sniffer
- Firewall configuration.
OUR HAPPY CLIENTS
WHAT OUR CLIENTS SAY ABOUT TELECONTRAN !!
The training was very good, informative and I gained a lot of knowledge on Linux.
The trainer and the hands-on sessions were fantastic and this workshop helped me to learn about PowerBI and Cyber Security.
The workshop was a mixture of networking and data centre terms that was extremely well presented and made very easy to understand.
The training was beneficial as the information shared throughout were new and we hope to use all of this information as a guidance for us to develop the necessary regulatory approach for future deployment of data centre in our country.