Difference between revisions of "Cyber Security Training"

From KENET Training
Jump to: navigation, search
(Timetable)
(Timetable)
Line 35: Line 35:
 
PM
 
PM
 
| Lunch
 
| Lunch
| Security
+
| Security [[http://training.kenet.or.ke/images/c/c7/Designing-with-cyber-security-in-mind.pdf]]
 
Architecture and Design
 
Architecture and Design
 
RO
 
RO

Revision as of 09:11, 26 October 2015

Trainers

Peter Muia PM

Ronald Osure RO

Paul Nzau PN

Maureen Wanja MW

Martin Njau MN

Timetable

Day 8.30-10.30 10.30-10.50 10.50-13.00 1300-1400 1400-1600 1600-1620 1620-1800
Monday Welcome

and registration,[[1]] Introduction to Cyber Security,[[2]] MW

Tea Break Security

Domains,[[3]] PM

Lunch Security [[4]]

Architecture and Design RO

Tea Break Wireless

Security MW

Tuesday Web

Attacks and Threats PM

Assessment

and Mitigation PM

Securing

Web Server/services labs MN/RO

Securing

Web Server/services labs RO/MN

Wednesday Network

Threats and Attack Types PN

Firewalls
pf, iptables

MN

Firewalls

and Defense with lab

MN

Switching

Security

PN

Thursday Ethical Hacking Introduction

PM

Footprinting

and Recon RO

Social,Engineering + Labs

RO/PM

Denial

of Service + Labs RO/PM

Friday Cryptography

and PKI PM

SSL

Configuration on web server LABS

RO/MN