Difference between revisions of "Cyber Security Training"
(→Timetable) |
(→Who should Attend?) |
||
(23 intermediate revisions by the same user not shown) | |||
Line 1: | Line 1: | ||
+ | =Introduction= | ||
+ | |||
+ | |||
+ | Cyber Security Workshop Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers with in the campus and also empower the network administrators on how to secure the campus network | ||
+ | |||
+ | =Objective= | ||
+ | |||
+ | This training will enable the network and system administrators run secure services within the campus network. | ||
+ | |||
+ | =Who should Attend?= | ||
+ | |||
+ | This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network. | ||
+ | |||
+ | =Cyber Security Training Topics= | ||
+ | |||
+ | 1. Day 1 : Introduction to Computer Security & Security domains | ||
+ | |||
+ | 2. Day 2 : Web Security | ||
+ | |||
+ | 3. Day 3 : Network and Wireless Security | ||
+ | |||
+ | 4. Day 4 : Ethical hacking and penetration testing | ||
+ | |||
+ | 5. Day 5 : Cryptography & Public Key Infrastructure | ||
+ | |||
+ | ==Day 1== | ||
+ | |||
+ | 8.30-9 Introduction & welcome | ||
+ | |||
+ | Introduction to Cyber Security | ||
+ | |||
+ | Security Domains | ||
+ | |||
+ | Security Architecture and Design/Designing with Cybersecurity in mind | ||
+ | |||
+ | |||
+ | ==Day 2== | ||
+ | |||
+ | Web Attacks and Threats | ||
+ | |||
+ | Assessment and Mitigation | ||
+ | |||
+ | Securing Web Server/services labs | ||
+ | |||
+ | ==Day 3== | ||
+ | |||
+ | Network Threats and Attack Types | ||
+ | |||
+ | Network Security and Defense with lab | ||
+ | |||
+ | Switching Security ? | ||
+ | |||
+ | ==Day 4== | ||
+ | |||
+ | Ethical Hacking | ||
+ | |||
+ | Introduction | ||
+ | |||
+ | Footprinting and Recon | ||
+ | |||
+ | Social Engineering + Labs | ||
+ | |||
+ | Denial of Service + Labs | ||
+ | |||
+ | ==Day 5== | ||
+ | |||
+ | Cryptography and PKI | ||
+ | |||
+ | SSL Configuration on web server LABS | ||
+ | |||
=Trainers= | =Trainers= | ||
Line 53: | Line 123: | ||
| | | | ||
| Securing | | Securing | ||
− | Web Server/services labs | + | Web Server/services labs [[http://training.kenet.or.ke/images/e/e1/Securing-web-server-modsec-apache.pdf]] |
+ | [[http://training.kenet.or.ke/images/c/c9/Csf-firewall-presentation.txt.pdf]] | ||
+ | MN | ||
MN/RO | MN/RO | ||
| | | | ||
| Securing | | Securing | ||
− | Web Server/services labs | + | Web Server/services labs [[http://training.kenet.or.ke/images/8/8e/Mod-security-lab_updated.txt]] |
+ | |||
+ | CSF LAB [[http://training.kenet.or.ke/images/9/96/Csf-firewall-lab.txt]] | ||
RO/MN | RO/MN | ||
|- | |- | ||
| Wednesday | | Wednesday | ||
| Network | | Network | ||
− | Threats and Attack | + | Threats and Attack Typesn[[http://training.kenet.or.ke/images/1/1d/Network_Threats_and_Attack_Types_-1.pdf]] |
PN | PN | ||
| | | | ||
| Firewalls | | Firewalls | ||
− | : pf, iptables | + | : pf, iptables [[http://training.kenet.or.ke/images/5/52/Firewalls-iptables-pf.pdf]] |
MN | MN | ||
| | | | ||
| Firewalls | | Firewalls | ||
and | and | ||
− | Defense with lab | + | Defense with lab [[http://training.kenet.or.ke/images/7/7b/Iptables-lab.txt]] |
MN | MN | ||
| | | | ||
| Switching | | Switching | ||
− | Security | + | Security[[http://training.kenet.or.ke/images/f/f4/Switch_Security_-2.pdf]] |
PN | PN | ||
|- | |- | ||
| Thursday | | Thursday | ||
− | | Ethical Hacking Introduction | + | | Ethical Hacking Introduction [[http://training.kenet.or.ke/images/a/a8/Ethical_Hacking_Final.pdf]] |
PM | PM | ||
| | | | ||
| Footprinting | | Footprinting | ||
− | and Recon | + | and Recon [[http://training.kenet.or.ke/images/a/a1/Footprinting-recon-scanning.pdf]] |
RO | RO | ||
| | | | ||
− | | Social,Engineering + Labs | + | | Social,Engineering[[http://training.kenet.or.ke/images/5/54/Presentation_Social_Engineering.pdf]] + Labs |
+ | Ping Lab[[http://training.kenet.or.ke/images/4/4d/Lab-1-ping.txt]] | ||
+ | |||
+ | Dig Lab[[http://training.kenet.or.ke/images/a/aa/Lab-2-dig.txt]] | ||
+ | |||
+ | NMAP lab[[http://training.kenet.or.ke/images/9/92/Lab-3-nmap.txt]] | ||
+ | |||
+ | Banner Grabbing Lab[[http://training.kenet.or.ke/images/5/5c/Lab-4-banner-grabbing.txt]] | ||
+ | |||
+ | Social Eng. LAB [[http://training.kenet.or.ke/images/1/15/Lab-5-social-eng.txt]] | ||
RO/PM | RO/PM | ||
| | | | ||
| Denial | | Denial | ||
− | of Service | + | of Service [[http://training.kenet.or.ke/images/2/2b/Denial-of-service.pdf]] DOS Lab [[http://training.kenet.or.ke/images/9/97/Lab-6-dos.txt]] |
RO/PM | RO/PM | ||
|- | |- | ||
Line 100: | Line 183: | ||
and PKI | and PKI | ||
PM | PM | ||
+ | |||
+ | PKI Introduction [[http://training.kenet.or.ke/images/d/d7/PKI-Intro_V2.pdf]] | ||
+ | |||
+ | Comodo [[http://training.kenet.or.ke/images/e/ee/COMODO.pdf]] | ||
+ | |||
+ | Summary steps to generate SSl Certificates[[http://training.kenet.or.ke/images/2/25/Summary_steps_to_generating_SSL_cert.pdf]] | ||
| | | | ||
| SSL | | SSL | ||
Configuration on | Configuration on | ||
− | web server LABS | + | web server LABS SSL CSR CERT Lab [[http://training.kenet.or.ke/images/0/01/Lab1_SSL.txt]] |
+ | |||
+ | Apache install SSL Cert [[http://training.kenet.or.ke/images/4/40/Lab2_apacheSSL.txt]] | ||
RO/MN | RO/MN | ||
Line 111: | Line 202: | ||
| | | | ||
|} | |} | ||
+ | |||
+ | |||
+ | ==Photo Gallery == | ||
+ | |||
+ | The photo gallery can be accessed here: [[https://gallery.kenet.or.ke/index.php/Cyber-Security-Training---26th-30th-October-2015]] | ||
+ | |||
+ | ==Recordings== | ||
+ | |||
+ | The training sessions were recorded and cab be accessed below: | ||
+ | |||
+ | |||
+ | Day 1 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1445837657770 ]] | ||
+ | |||
+ | Day 2 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1445923075744]] | ||
+ | |||
+ | Day 3 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446009192069]] | ||
+ | |||
+ | Day 4 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446096383625]] | ||
+ | |||
+ | Day 5 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446183350578]] |
Latest revision as of 08:58, 6 November 2015
Contents
Introduction
Cyber Security Workshop Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers with in the campus and also empower the network administrators on how to secure the campus network
Objective
This training will enable the network and system administrators run secure services within the campus network.
Who should Attend?
This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.
Cyber Security Training Topics
1. Day 1 : Introduction to Computer Security & Security domains
2. Day 2 : Web Security
3. Day 3 : Network and Wireless Security
4. Day 4 : Ethical hacking and penetration testing
5. Day 5 : Cryptography & Public Key Infrastructure
Day 1
8.30-9 Introduction & welcome
Introduction to Cyber Security
Security Domains
Security Architecture and Design/Designing with Cybersecurity in mind
Day 2
Web Attacks and Threats
Assessment and Mitigation
Securing Web Server/services labs
Day 3
Network Threats and Attack Types
Network Security and Defense with lab
Switching Security ?
Day 4
Ethical Hacking
Introduction
Footprinting and Recon
Social Engineering + Labs
Denial of Service + Labs
Day 5
Cryptography and PKI
SSL Configuration on web server LABS
Trainers
Peter Muia PM
Ronald Osure RO
Paul Nzau PN
Maureen Wanja MW
Martin Njau MN
Timetable
Day | 8.30-10.30 | 10.30-10.50 | 10.50-13.00 | 1300-1400 | 1400-1600 | 1600-1620 | 1620-1800 |
---|---|---|---|---|---|---|---|
Monday | Welcome
and registration,[[1]] Introduction to Cyber Security,[[2]] MW |
Tea Break | Security
Domains,[[3]] PM |
Lunch | Security [[4]]
Architecture and Design RO |
Tea Break | Wireless
Security [[5]] MW |
Tuesday | Web
Attacks and Threats [[6]] PM |
Assessment
and Mitigation PM |
Securing | Securing
Web Server/services labs [[9]] CSF LAB [[10]] RO/MN | |||
Wednesday | Network
Threats and Attack Typesn[[11]] PN |
Firewalls
MN |
Firewalls
and Defense with lab [[13]] MN |
Switching
Security[[14]] PN | |||
Thursday | Ethical Hacking Introduction [[15]]
PM |
Footprinting
and Recon [[16]] RO |
Social,Engineering[[17]] + Labs
Ping Lab[[18]] Dig Lab[[19]] NMAP lab[[20]] Banner Grabbing Lab[[21]] Social Eng. LAB [[22]] RO/PM |
Denial | |||
Friday | Cryptography
and PKI PM PKI Introduction [[25]] Comodo [[26]] Summary steps to generate SSl Certificates[[27]] |
SSL
Configuration on web server LABS SSL CSR CERT Lab [[28]] Apache install SSL Cert [[29]] RO/MN |
Photo Gallery
The photo gallery can be accessed here: [[30]]
Recordings
The training sessions were recorded and cab be accessed below:
Day 1 - [[31]]
Day 2 - [[32]]
Day 3 - [[33]]
Day 4 - [[34]]
Day 5 - [[35]]