Difference between revisions of "Cyber Security"
(→Security Fundamentals) |
|||
Line 35: | Line 35: | ||
Availability | Availability | ||
− | + | ===Attacks and Threats=== | |
+ | |||
Worms & Trojans | Worms & Trojans | ||
+ | |||
Malware and Social Engineering Attacks | Malware and Social Engineering Attacks | ||
+ | |||
Attacks Using Malware | Attacks Using Malware | ||
+ | |||
Social Engineering Attacks | Social Engineering Attacks | ||
− | + | ===Switching security=== | |
+ | |||
Port Security | Port Security | ||
+ | |||
Understanding Switch Security Issues | Understanding Switch Security Issues | ||
+ | |||
Protecting Against VLAN Attacks | Protecting Against VLAN Attacks | ||
+ | |||
Protecting Against Spoofing Attacks | Protecting Against Spoofing Attacks | ||
+ | |||
Securing Network Services | Securing Network Services | ||
+ | |||
Secure Network Switches to Mitigate Security Attack | Secure Network Switches to Mitigate Security Attack | ||
− | + | ||
+ | ===Application and Network Attacks=== | ||
+ | |||
Application Attacks | Application Attacks | ||
+ | |||
Rogue DHCP Server protection | Rogue DHCP Server protection | ||
+ | |||
Web Application Attacks | Web Application Attacks | ||
+ | |||
Client-Side Attacks | Client-Side Attacks | ||
+ | |||
Buffer Overflow Attacks | Buffer Overflow Attacks | ||
+ | |||
Network Attacks | Network Attacks | ||
+ | |||
Denial of Service (DoS) | Denial of Service (DoS) | ||
+ | |||
Interception | Interception | ||
+ | |||
Poisoning | Poisoning | ||
+ | |||
Attacks on Access Rights | Attacks on Access Rights | ||
− | + | ||
+ | ===Network Security and Defense=== | ||
+ | |||
Security Through Network Devices | Security Through Network Devices | ||
+ | |||
Security Through Network Technologies | Security Through Network Technologies | ||
+ | |||
Network Address Translation (NAT) | Network Address Translation (NAT) | ||
+ | |||
Network Access Control (NAC) | Network Access Control (NAC) | ||
+ | |||
Security Through Network Design Elements | Security Through Network Design Elements | ||
+ | |||
Demilitarized Zone (DMZ) | Demilitarized Zone (DMZ) | ||
+ | |||
Subnetting | Subnetting | ||
+ | |||
Virtual LANs (VLANs) | Virtual LANs (VLANs) | ||
+ | |||
Remote Access | Remote Access | ||
+ | |||
Wireless Network Security | Wireless Network Security | ||
− | + | === Host, Application, and Data Security=== | |
+ | |||
Securing Devices. | Securing Devices. | ||
+ | |||
Physical Security | Physical Security | ||
+ | |||
Hardware Security | Hardware Security | ||
+ | |||
Securing the Operating System Software | Securing the Operating System Software | ||
+ | |||
Securing with Anti-Malware Software | Securing with Anti-Malware Software | ||
+ | |||
Monitoring System Logs | Monitoring System Logs | ||
+ | |||
Application Security | Application Security | ||
− | + | ===Digital Certificates & PKI=== | |
+ | |||
Introduction to cryptography/symmetric and public key cryptography | Introduction to cryptography/symmetric and public key cryptography | ||
− | |||
− | |||
− | |||
− | + | Digital certificates | |
+ | |||
+ | Digital signatures | ||
+ | |||
+ | Public Key Infrastructure | ||
+ | |||
+ | ===Web/Software application security=== | ||
+ | |||
web applications vulnerabilities | web applications vulnerabilities | ||
+ | |||
Cross Site Scripting | Cross Site Scripting | ||
+ | |||
SQL Injection | SQL Injection | ||
+ | |||
Denial of Service | Denial of Service | ||
+ | |||
Code Execution | Code Execution | ||
+ | |||
Local File include | Local File include | ||
+ | |||
General web application security recommendations | General web application security recommendations | ||
+ | |||
Guard against malicious user input | Guard against malicious user input | ||
− | + | ===Vulnerability Assessment and Mitigating Attacks=== | |
+ | |||
Assessment Techniques | Assessment Techniques | ||
+ | |||
Assessment Tools | Assessment Tools | ||
+ | |||
Vulnerability Scanning? | Vulnerability Scanning? | ||
+ | |||
Penetration Testing | Penetration Testing | ||
+ | |||
Creating a Security Posture | Creating a Security Posture | ||
+ | |||
Configuring Controls | Configuring Controls | ||
+ | |||
Hardening | Hardening | ||
+ | |||
Reporting | Reporting | ||
− | + | ===Access Control and Physical (Environmental) Security=== | |
+ | |||
Identification | Identification | ||
+ | |||
Authorization | Authorization | ||
+ | |||
Authentication | Authentication | ||
+ | |||
Accounting | Accounting | ||
− | + | ||
+ | ===Cyber Law === | ||
+ | |||
Legal regulations | Legal regulations | ||
+ | |||
Investigations and | Investigations and | ||
Compliance | Compliance |
Revision as of 12:54, 24 February 2014
Contents
[hide]- 1 Cyber Security Workshop
- 1.1 Who Should Attend?
- 1.2 Prerequisites
- 1.3 Target Group:
- 1.4 Course content
- 1.4.1 Security Fundamentals
- 1.4.2 Attacks and Threats
- 1.4.3 Switching security
- 1.4.4 Application and Network Attacks
- 1.4.5 Network Security and Defense
- 1.4.6 Host, Application, and Data Security
- 1.4.7 Digital Certificates & PKI
- 1.4.8 Web/Software application security
- 1.4.9 Vulnerability Assessment and Mitigating Attacks
- 1.4.10 Access Control and Physical (Environmental) Security
- 1.4.11 Cyber Law
Cyber Security Workshop
Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers within the campus and also empower the network administrators on how to secure the campus network. Objective This training will enable the network and system administrators run secure services within the campus network.
Who Should Attend?
This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.
Prerequisites
I.A laptop with wireless capability
II.IPv4 addressing and general network concepts
III. Knowledge of UNIX and/or Linux
IV. At least three years’ experience as a systems / network administrator in a medium to large campus network
V. Residential
Target Group:
Systems/Network Administrators in charge of security;
Course content
Security Fundamentals
Confidentiality
Integrity
Availability
Attacks and Threats
Worms & Trojans
Malware and Social Engineering Attacks
Attacks Using Malware
Social Engineering Attacks
Switching security
Port Security
Understanding Switch Security Issues
Protecting Against VLAN Attacks
Protecting Against Spoofing Attacks
Securing Network Services
Secure Network Switches to Mitigate Security Attack
Application and Network Attacks
Application Attacks
Rogue DHCP Server protection
Web Application Attacks
Client-Side Attacks
Buffer Overflow Attacks
Network Attacks
Denial of Service (DoS)
Interception
Poisoning
Attacks on Access Rights
Network Security and Defense
Security Through Network Devices
Security Through Network Technologies
Network Address Translation (NAT)
Network Access Control (NAC)
Security Through Network Design Elements
Demilitarized Zone (DMZ)
Subnetting
Virtual LANs (VLANs)
Remote Access
Wireless Network Security
Host, Application, and Data Security
Securing Devices.
Physical Security
Hardware Security
Securing the Operating System Software
Securing with Anti-Malware Software
Monitoring System Logs
Application Security
Digital Certificates & PKI
Introduction to cryptography/symmetric and public key cryptography
Digital certificates
Digital signatures
Public Key Infrastructure
Web/Software application security
web applications vulnerabilities
Cross Site Scripting
SQL Injection
Denial of Service
Code Execution
Local File include
General web application security recommendations
Guard against malicious user input
Vulnerability Assessment and Mitigating Attacks
Assessment Techniques
Assessment Tools
Vulnerability Scanning?
Penetration Testing
Creating a Security Posture
Configuring Controls
Hardening
Reporting
Access Control and Physical (Environmental) Security
Identification
Authorization
Authentication
Accounting
Cyber Law
Legal regulations
Investigations and Compliance