Difference between revisions of "Cyber Security Training"
From KENET Training
(→Timetable) |
(→Timetable) |
||
Line 113: | Line 113: | ||
and PKI | and PKI | ||
PM | PM | ||
+ | |||
+ | PKI Introduction [[http://training.kenet.or.ke/images/d/d7/PKI-Intro_V2.pdf]] | ||
+ | |||
+ | Comodo [[http://training.kenet.or.ke/images/e/ee/COMODO.pdf]] | ||
+ | |||
+ | Summary steps to generate SSl Certificates[[http://training.kenet.or.ke/images/2/25/Summary_steps_to_generating_SSL_cert.pdf]] | ||
| | | | ||
| SSL | | SSL |
Revision as of 06:19, 30 October 2015
Trainers
Peter Muia PM
Ronald Osure RO
Paul Nzau PN
Maureen Wanja MW
Martin Njau MN
Timetable
Day | 8.30-10.30 | 10.30-10.50 | 10.50-13.00 | 1300-1400 | 1400-1600 | 1600-1620 | 1620-1800 |
---|---|---|---|---|---|---|---|
Monday | Welcome
and registration,[[1]] Introduction to Cyber Security,[[2]] MW |
Tea Break | Security
Domains,[[3]] PM |
Lunch | Security [[4]]
Architecture and Design RO |
Tea Break | Wireless
Security [[5]] MW |
Tuesday | Web
Attacks and Threats [[6]] PM |
Assessment
and Mitigation PM |
Securing | Securing
Web Server/services labs [[9]] CSF LAB [[10]] RO/MN | |||
Wednesday | Network
Threats and Attack Typesn[[11]] PN |
Firewalls
MN |
Firewalls
and Defense with lab [[13]] MN |
Switching
Security[[14]] PN | |||
Thursday | Ethical Hacking Introduction [[15]]
PM |
Footprinting
and Recon [[16]] RO |
Social,Engineering[[17]] + Labs
Ping Lab[[18]] Dig Lab[[19]] NMAP lab[[20]] Banner Grabbing Lab[[21]] Social Eng. LAB [[22]] RO/PM |
Denial | |||
Friday | Cryptography
and PKI PM PKI Introduction [[25]] Comodo [[26]] Summary steps to generate SSl Certificates[[27]] |
SSL
Configuration on web server LABS RO/MN |