Difference between revisions of "Cyber Security Training"

From KENET Training
Jump to: navigation, search
(Timetable)
(Timetable)
Line 85: Line 85:
 
|-
 
|-
 
| Thursday
 
| Thursday
| Ethical Hacking Introduction
+
| Ethical Hacking Introduction [[http://training.kenet.or.ke/images/a/a8/Ethical_Hacking_Final.pdf]]
 
PM
 
PM
 
|  
 
|  

Revision as of 06:53, 29 October 2015

Trainers

Peter Muia PM

Ronald Osure RO

Paul Nzau PN

Maureen Wanja MW

Martin Njau MN

Timetable

Day 8.30-10.30 10.30-10.50 10.50-13.00 1300-1400 1400-1600 1600-1620 1620-1800
Monday Welcome

and registration,[[1]] Introduction to Cyber Security,[[2]] MW

Tea Break Security

Domains,[[3]] PM

Lunch Security [[4]]

Architecture and Design RO

Tea Break Wireless

Security [[5]] MW

Tuesday Web

Attacks and Threats [[6]] PM

Assessment

and Mitigation PM

Securing

Web Server/services labs [[7]] [[8]] MN MN/RO

Securing

Web Server/services labs [[9]]

CSF LAB [[10]] RO/MN

Wednesday Network

Threats and Attack Typesn[[11]] PN

Firewalls
pf, iptables [[12]]

MN

Firewalls

and Defense with lab [[13]]

MN

Switching

Security[[14]]

PN

Thursday Ethical Hacking Introduction [[15]]

PM

Footprinting

and Recon RO

Social,Engineering + Labs

RO/PM

Denial

of Service + Labs RO/PM

Friday Cryptography

and PKI PM

SSL

Configuration on web server LABS

RO/MN