Difference between revisions of "Cyber Security Training"
From KENET Training
(→Timetable) |
(→Timetable) |
||
Line 89: | Line 89: | ||
| | | | ||
| Footprinting | | Footprinting | ||
− | and Recon | + | and Recon [[http://training.kenet.or.ke/images/a/a1/Footprinting-recon-scanning.pdf]] |
RO | RO | ||
| | | | ||
− | | Social,Engineering + Labs | + | | Social,Engineering[[http://training.kenet.or.ke/images/5/54/Presentation_Social_Engineering.pdf]] + Labs |
RO/PM | RO/PM | ||
| | | | ||
| Denial | | Denial | ||
− | of Service | + | of Service [[http://training.kenet.or.ke/images/2/2b/Denial-of-service.pdf]] Labs |
RO/PM | RO/PM | ||
|- | |- |
Revision as of 07:26, 29 October 2015
Trainers
Peter Muia PM
Ronald Osure RO
Paul Nzau PN
Maureen Wanja MW
Martin Njau MN
Timetable
Day | 8.30-10.30 | 10.30-10.50 | 10.50-13.00 | 1300-1400 | 1400-1600 | 1600-1620 | 1620-1800 |
---|---|---|---|---|---|---|---|
Monday | Welcome
and registration,[[1]] Introduction to Cyber Security,[[2]] MW |
Tea Break | Security
Domains,[[3]] PM |
Lunch | Security [[4]]
Architecture and Design RO |
Tea Break | Wireless
Security [[5]] MW |
Tuesday | Web
Attacks and Threats [[6]] PM |
Assessment
and Mitigation PM |
Securing | Securing
Web Server/services labs [[9]] CSF LAB [[10]] RO/MN | |||
Wednesday | Network
Threats and Attack Typesn[[11]] PN |
Firewalls
MN |
Firewalls
and Defense with lab [[13]] MN |
Switching
Security[[14]] PN | |||
Thursday | Ethical Hacking Introduction [[15]]
PM |
Footprinting
and Recon [[16]] RO |
Social,Engineering[[17]] + Labs
RO/PM |
Denial
of Service [[18]] Labs RO/PM | |||
Friday | Cryptography
and PKI PM |
SSL
Configuration on web server LABS RO/MN |