Difference between revisions of "Cyber Security Training"

From KENET Training
Jump to: navigation, search
(Course Outline)
(Course Outline)
Line 4: Line 4:
  
 
1. Day 1 : Introduction to Computer Security & Security domains
 
1. Day 1 : Introduction to Computer Security & Security domains
 +
 
2. Day 2 : Web Security
 
2. Day 2 : Web Security
 +
 
3. Day 3 : Network and Wireless Security
 
3. Day 3 : Network and Wireless Security
 +
 
4. Day 4 : Ethical hacking and penetration testing
 
4. Day 4 : Ethical hacking and penetration testing
 +
 
5. Day 5 : Cryptography & Public Key Infrastructure
 
5. Day 5 : Cryptography & Public Key Infrastructure
  
Line 14: Line 18:
  
 
Introduction to Cyber Security
 
Introduction to Cyber Security
 +
 
Security Domains
 
Security Domains
 +
 
Security Architecture and Design/Designing with Cybersecurity in mind
 
Security Architecture and Design/Designing with Cybersecurity in mind
 +
 +
Wireless Security
  
  

Revision as of 08:09, 15 October 2015

Course Outline

Cyber Security Training Topics

1. Day 1 : Introduction to Computer Security & Security domains

2. Day 2 : Web Security

3. Day 3 : Network and Wireless Security

4. Day 4 : Ethical hacking and penetration testing

5. Day 5 : Cryptography & Public Key Infrastructure

Day 1

8.30-9 Introduction & welcome

Introduction to Cyber Security

Security Domains

Security Architecture and Design/Designing with Cybersecurity in mind

Wireless Security


Day 2

Web Attacks and Threats Assessment and Mitigation Securing Web Server/services labs

Day 3

Network Threats and Attack Types Network Security and Defense with lab Switching Security ?

Day 4

Ethical Hacking Introduction Footprinting and Recon Social Engineering + Labs Denial of Service + Labs

Day 5

Cryptography and PKI SSL Configuration on web server LABS

Trainers

Peter Muia PM

Ronald Osure RO

Paul Nzau PN

Maureen Wanja MW

Martin Nzau MN

Timetable

Day 8.30-10.30 10.30-10.50 10.50-13.00 1300-1400 1400-1600 1600-1620 1620-1800
Monday Welcome

and registration, Introduction to Cyber Security, MW

Tea Break Security

Domains, PM

Lunch Security

Architecture and Design RO

Tea Break Wireless

Security MW

Tuesday Web

Attacks and Threats PM

Assessment

and Mitigation PM

Securing

Web Server/services labs MN/RO

Securing

Web Server/services labs RO/MN

Wednesday Network

Threats and Attack Types PN

Firewalls
pf, iptables

MN

Firewalls

and Defense with lab

MN

Switching

Security

PN

Thursday Ethical Hacking Introduction

PM

Footprinting

and Recon RO

Social,Engineering + Labs

RO/PM

Denial

of Service + Labs RO/PM

Friday Cryptography

and PKI PM

SSL

Configuration on web server LABS

RO/MN