Difference between revisions of "Cyber Security Training"
From KENET Training
(→Timetable) |
(→Timetable) |
||
Line 93: | Line 93: | ||
| | | | ||
| Social,Engineering[[http://training.kenet.or.ke/images/5/54/Presentation_Social_Engineering.pdf]] + Labs | | Social,Engineering[[http://training.kenet.or.ke/images/5/54/Presentation_Social_Engineering.pdf]] + Labs | ||
+ | Ping Lab[[http://training.kenet.or.ke/images/4/4d/Lab-1-ping.txt]] | ||
+ | |||
Dig Lab[[http://training.kenet.or.ke/images/a/aa/Lab-2-dig.txt]] | Dig Lab[[http://training.kenet.or.ke/images/a/aa/Lab-2-dig.txt]] | ||
Revision as of 08:04, 29 October 2015
Trainers
Peter Muia PM
Ronald Osure RO
Paul Nzau PN
Maureen Wanja MW
Martin Njau MN
Timetable
Day | 8.30-10.30 | 10.30-10.50 | 10.50-13.00 | 1300-1400 | 1400-1600 | 1600-1620 | 1620-1800 |
---|---|---|---|---|---|---|---|
Monday | Welcome
and registration,[[1]] Introduction to Cyber Security,[[2]] MW |
Tea Break | Security
Domains,[[3]] PM |
Lunch | Security [[4]]
Architecture and Design RO |
Tea Break | Wireless
Security [[5]] MW |
Tuesday | Web
Attacks and Threats [[6]] PM |
Assessment
and Mitigation PM |
Securing | Securing
Web Server/services labs [[9]] CSF LAB [[10]] RO/MN | |||
Wednesday | Network
Threats and Attack Typesn[[11]] PN |
Firewalls
MN |
Firewalls
and Defense with lab [[13]] MN |
Switching
Security[[14]] PN | |||
Thursday | Ethical Hacking Introduction [[15]]
PM |
Footprinting
and Recon [[16]] RO |
Social,Engineering[[17]] + Labs
Ping Lab[[18]] Dig Lab[[19]] NMAP lab[[20]] Banner Grabbing Lab[[21]] Social Eng. LAB [[22]] RO/PM |
Denial | |||
Friday | Cryptography
and PKI PM |
SSL
Configuration on web server LABS RO/MN |