Cyber Security
Cyber Security Workshop
Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers within the campus and also empower the network administrators on how to secure the campus network.
Contents
- 1 Objective
- 2 Who Should Attend?
- 3 Prerequisites
- 4 Target Group:
- 5 Course content
- 5.1 Security Fundamentals
- 5.2 Attacks and Threats
- 5.3 Switching security
- 5.4 Application and Network Attacks
- 5.5 Network Security and Defense
- 5.6 Host, Application, and Data Security
- 5.7 Digital Certificates & PKI
- 5.8 Web/Software application security
- 5.9 Vulnerability Assessment and Mitigating Attacks
- 5.10 Access Control and Physical (Environmental) Security
- 5.11 Cyber Law
Objective
This training will enable the network and system administrators run secure services within the campus network.
Who Should Attend?
This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.
Prerequisites
I.A laptop with wireless capability
II.IPv4 addressing and general network concepts
III. Knowledge of UNIX and/or Linux
IV. At least three years’ experience as a systems / network administrator in a medium to large campus network
V. Residential
Target Group:
Systems/Network Administrators in charge of security;
Course content
Security Fundamentals
Confidentiality
Integrity
Availability
Attacks and Threats
Worms & Trojans
Malware and Social Engineering Attacks
Attacks Using Malware
Social Engineering Attacks
Switching security
Port Security
Understanding Switch Security Issues
Protecting Against VLAN Attacks
Protecting Against Spoofing Attacks
Securing Network Services
Secure Network Switches to Mitigate Security Attack
Application and Network Attacks
Application Attacks
Rogue DHCP Server protection
Web Application Attacks
Client-Side Attacks
Buffer Overflow Attacks
Network Attacks
Denial of Service (DoS)
Interception
Poisoning
Attacks on Access Rights
Network Security and Defense
Security Through Network Devices
Security Through Network Technologies
Network Address Translation (NAT)
Network Access Control (NAC)
Security Through Network Design Elements
Demilitarized Zone (DMZ)
Subnetting
Virtual LANs (VLANs)
Remote Access
Wireless Network Security
Host, Application, and Data Security
Securing Devices.
Physical Security
Hardware Security
Securing the Operating System Software
Securing with Anti-Malware Software
Monitoring System Logs
Application Security
Digital Certificates & PKI
Introduction to cryptography/symmetric and public key cryptography
Digital certificates
Digital signatures
Public Key Infrastructure
Web/Software application security
web applications vulnerabilities
Cross Site Scripting
SQL Injection
Denial of Service
Code Execution
Local File include
General web application security recommendations
Guard against malicious user input
Vulnerability Assessment and Mitigating Attacks
Assessment Techniques
Assessment Tools
Vulnerability Scanning?
Penetration Testing
Creating a Security Posture
Configuring Controls
Hardening
Reporting
Access Control and Physical (Environmental) Security
Identification
Authorization
Authentication
Accounting
Cyber Law
Legal regulations
Investigations and Compliance