Cyber Security

From KENET Training
Jump to: navigation, search

Cyber Security Workshop

Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers within the campus and also empower the network administrators on how to secure the campus network.



This training will enable the network and system administrators run secure services within the campus network.

Who Should Attend?

This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.


I.A laptop with wireless capability

II.IPv4 addressing and general network concepts

III. Knowledge of UNIX and/or Linux

IV. At least three years’ experience as a systems / network administrator in a medium to large campus network

V. Residential

Target Group:

Systems/Network Administrators in charge of security;


Day 8.30-10.30 10.30-10.50 10.50-13.00 1300-1400 1400-1600 1600-1620 1620-1800
Monday Welcome and registrationFundamentals of security [[1]] Tea Break Attacks and Threats [[2]] Lunch Switching security [[3]] Tea Break Switching security
Tuesday Application and Network Attacks Tea Break Application and Network Attacks Lab [[4]] Lunch Network Security and Defense [[5]] Tea Break Network Security and Defense Lab [[6]] Wireless Security [[7]]
Wednesday Host, Application, and Data Security Presentation [[8]] Tea Break Host, Application, and Data Security Mod Security [[9]] Ip tables[[10]] SSH keys [[11]] Lunch Digital Certificates & PKI [[12]] Tea Break Digital Certificates & PKI Lab 1 [[13]] Lab 2 [[14]]
Thursday Web/Software application security [[15]] Tea Break Web/Software application security Lunch Vulnerability Assessment and Mitigating Attacks [[16]] Tea Break Vulnerability Assessment and Mitigating Attacks
Friday Access Control and Physical (Environmental) Security Tea Break Access Control and Physical (Environmental) Security Lunch Closing ceremony and certificate Tea Break
NO: Title First Name Last Name Other Names Institution Job Title E-mail
1 Mrs Brenda Isaboke Nyangweso Adventist University of Africa ICT Administrator
2 Mr. Sila Too Kimutai Moi University Assistant System Librarian
3 Mr. Samson Too Kipketer Moi University IT Technician
4 Miss. Doreen Wasike Khayanga Moi University Senior assistant hardware engineer
5 Mr. Edward Savatia Mahanga Kibabii University College Systems Administrator
6 Mr. Markphalen Odiwuor Ochola Kenya Medical Research Institute – KEMRI RTCIP IT Officer
7 Mr. Alex Mugambi K Egerton University Network Administrator
8 Mr. Joseph Samuel Kombe Taita Taveta University College System Software Technologist
9 Mr. Rogers Koech Kipchirchir University of Eldoret System Administrator
10 Mr. James Kimondo Muturi Pwani University Networks Administrator
11 Mr. Joseph Nyakoni M Kenya Industrial Research Institute (KIRDI) Head ICT Operations
12 Mr. Arthur Oyoo Kenya Industrial Research Institute (KIRDI) RESEARCH SCIENTIST
13 Mr. David Mwangi Management University of Africa Head ICT Services
14 Mr. Amba Samedi University of Eastern Africa - Baraton Web Network Administrator
15 Mr. Hussein Hassanali Technical University of Mombasa Network Administrator
16 Mr. Jared Otieno Nyanjom Multi Media Unviersity Webmaster
17 Mr. Mesfin Teshome Abeje Africa International University IT/Network Administrator - Acting IT Director
18 Mr. Chris Wanyoike Kenya School of Monetary Studies IT Services
19 Mr. Martin Njau Kenya Education Network Systems Administrator
20 Ms. Nyanjau Kimani Kenya Education Network Systems Administrator
21 Mr. Robert Okal Japheth International Livestock Research Institution (ILRI) ICT Infrastructure Specialist
22 Mr. GEORGE OGOTI International Livestock Research Institution (ILRI) SERVER SPECIALIST
23 Mr. Arthur Wainaina JKUAT

Group Photo

DSC 5401.JPG

Course content

Security Fundamentals




Attacks and Threats

Worms & Trojans

Malware and Social Engineering Attacks

Attacks Using Malware

Social Engineering Attacks

Switching security

Port Security

Understanding Switch Security Issues

Protecting Against VLAN Attacks

Protecting Against Spoofing Attacks

Securing Network Services

Secure Network Switches to Mitigate Security Attack

Application and Network Attacks

Application Attacks

Rogue DHCP Server protection

Web Application Attacks

Client-Side Attacks

Buffer Overflow Attacks

Network Attacks

Denial of Service (DoS)



Attacks on Access Rights

Network Security and Defense

Security Through Network Devices

Security Through Network Technologies

Network Address Translation (NAT)

Network Access Control (NAC)

Security Through Network Design Elements

Demilitarized Zone (DMZ)


Virtual LANs (VLANs)

Remote Access

Wireless Network Security

Host, Application, and Data Security

Securing Devices.

Physical Security

Hardware Security

Securing the Operating System Software

Securing with Anti-Malware Software

Monitoring System Logs

Application Security

Digital Certificates & PKI

Introduction to cryptography/symmetric and public key cryptography

Digital certificates

Digital signatures

Public Key Infrastructure

Web/Software application security

web applications vulnerabilities

Cross Site Scripting

SQL Injection

Denial of Service

Code Execution

Local File include

General web application security recommendations

Guard against malicious user input

Vulnerability Assessment and Mitigating Attacks

Assessment Techniques

Assessment Tools

Vulnerability Scanning?

Penetration Testing

Creating a Security Posture

Configuring Controls



Access Control and Physical (Environmental) Security





Cyber Law

Legal regulations

Investigations and Compliance