Difference between revisions of "Cyber Security Training"

From KENET Training
Jump to: navigation, search
(Trainers)
(Who should Attend?)
 
(35 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
=Introduction=
 +
 +
 +
Cyber Security Workshop Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers with in the campus and also empower the network administrators on how to secure the campus network
 +
 +
=Objective=
 +
 +
This training will enable the network and system administrators run secure services within the campus network.
 +
 +
=Who should Attend?=
 +
 +
This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.
 +
 +
=Cyber Security Training Topics=
 +
 +
1. Day 1 : Introduction to Computer Security & Security domains
 +
 +
2. Day 2 : Web Security
 +
 +
3. Day 3 : Network and Wireless Security
 +
 +
4. Day 4 : Ethical hacking and penetration testing
 +
 +
5. Day 5 : Cryptography & Public Key Infrastructure
 +
 +
==Day 1==
 +
 +
8.30-9 Introduction & welcome
 +
 +
Introduction to Cyber Security
 +
 +
Security Domains
 +
 +
Security Architecture and Design/Designing with Cybersecurity in mind
 +
 +
 +
==Day 2==
 +
 +
Web Attacks and Threats
 +
 +
Assessment and Mitigation
 +
 +
Securing Web Server/services labs
 +
 +
==Day 3==
 +
 +
Network Threats and Attack Types
 +
 +
Network Security and Defense with lab
 +
 +
Switching Security ?
 +
 +
==Day 4==
 +
 +
Ethical Hacking
 +
 +
Introduction
 +
 +
Footprinting and Recon
 +
 +
Social Engineering + Labs
 +
 +
Denial of Service + Labs
 +
 +
==Day 5==
 +
 +
Cryptography and PKI
 +
 +
SSL Configuration on web server LABS
 +
 
=Trainers=
 
=Trainers=
  
  
 
Peter Muia PM
 
Peter Muia PM
 +
 
Ronald Osure RO
 
Ronald Osure RO
 +
 
Paul Nzau PN
 
Paul Nzau PN
 +
 
Maureen Wanja MW
 
Maureen Wanja MW
Martin Nzau MN
+
 
 +
Martin Njau MN
  
 
=Timetable=
 
=Timetable=
Line 22: Line 96:
 
| Monday
 
| Monday
 
| Welcome
 
| Welcome
and registration,
+
and registration,[[http://training.kenet.or.ke/images/2/2d/Introduction.pdf]]
 
Introduction
 
Introduction
to Cyber Security,
+
to Cyber Security,[[http://training.kenet.or.ke/images/c/c9/01-intro-security.pdf]]
 
MW
 
MW
 
| Tea Break
 
| Tea Break
 
| Security
 
| Security
Domains,
+
Domains,[[http://training.kenet.or.ke/images/6/6f/Security_domains_final.pdf]]
 
PM
 
PM
 
| Lunch
 
| Lunch
| Security
+
| Security [[http://training.kenet.or.ke/images/c/c7/Designing-with-cyber-security-in-mind.pdf]]
 
Architecture and Design
 
Architecture and Design
 
RO
 
RO
 
| Tea Break
 
| Tea Break
 
| Wireless
 
| Wireless
Security
+
Security [[http://training.kenet.or.ke/images/4/47/NSRC_Wireless_3.1_Wireless_security_-_Principles_%26_Tools%282%29.pdf]]
 
MW
 
MW
 
|-
 
|-
 
| Tuesday
 
| Tuesday
 
| Web
 
| Web
Attacks and Threats  
+
Attacks and Threats [[http://training.kenet.or.ke/images/0/02/Web_Security_V2.pdf]]
 
PM
 
PM
 
|  
 
|  
Line 49: Line 123:
 
|  
 
|  
 
| Securing
 
| Securing
Web Server/services labs  
+
Web Server/services labs [[http://training.kenet.or.ke/images/e/e1/Securing-web-server-modsec-apache.pdf]]
 +
[[http://training.kenet.or.ke/images/c/c9/Csf-firewall-presentation.txt.pdf]]
 +
MN
 
MN/RO
 
MN/RO
 
|  
 
|  
 
| Securing
 
| Securing
Web Server/services labs
+
Web Server/services labs [[http://training.kenet.or.ke/images/8/8e/Mod-security-lab_updated.txt]]
 +
 
 +
CSF LAB [[http://training.kenet.or.ke/images/9/96/Csf-firewall-lab.txt]]
 
RO/MN
 
RO/MN
 
|-
 
|-
 
| Wednesday
 
| Wednesday
 
| Network
 
| Network
Threats and Attack Types
+
Threats and Attack Typesn[[http://training.kenet.or.ke/images/1/1d/Network_Threats_and_Attack_Types_-1.pdf]]
 
PN
 
PN
 
|  
 
|  
 
| Firewalls
 
| Firewalls
: pf, iptables
+
: pf, iptables [[http://training.kenet.or.ke/images/5/52/Firewalls-iptables-pf.pdf]]
 
MN
 
MN
 
|  
 
|  
 
| Firewalls
 
| Firewalls
 
and
 
and
Defense with lab
+
Defense with lab [[http://training.kenet.or.ke/images/7/7b/Iptables-lab.txt]]
  
 
MN
 
MN
 
|  
 
|  
 
| Switching
 
| Switching
Security
+
Security[[http://training.kenet.or.ke/images/f/f4/Switch_Security_-2.pdf]]
  
 
PN
 
PN
 
|-
 
|-
 
| Thursday
 
| Thursday
| Ethical Hacking Introduction
+
| Ethical Hacking Introduction [[http://training.kenet.or.ke/images/a/a8/Ethical_Hacking_Final.pdf]]
 
PM
 
PM
 
|  
 
|  
 
| Footprinting
 
| Footprinting
and Recon
+
and Recon [[http://training.kenet.or.ke/images/a/a1/Footprinting-recon-scanning.pdf]]
 
RO
 
RO
 
|  
 
|  
| Social,Engineering + Labs
+
| Social,Engineering[[http://training.kenet.or.ke/images/5/54/Presentation_Social_Engineering.pdf]] + Labs
 +
Ping Lab[[http://training.kenet.or.ke/images/4/4d/Lab-1-ping.txt]]
 +
 
 +
Dig Lab[[http://training.kenet.or.ke/images/a/aa/Lab-2-dig.txt]]
 +
 
 +
NMAP lab[[http://training.kenet.or.ke/images/9/92/Lab-3-nmap.txt]]
 +
 
 +
Banner Grabbing Lab[[http://training.kenet.or.ke/images/5/5c/Lab-4-banner-grabbing.txt]]
 +
 
 +
Social Eng. LAB [[http://training.kenet.or.ke/images/1/15/Lab-5-social-eng.txt]]
  
 
RO/PM
 
RO/PM
 
|  
 
|  
 
| Denial
 
| Denial
of Service + Labs
+
of Service [[http://training.kenet.or.ke/images/2/2b/Denial-of-service.pdf]] DOS Lab [[http://training.kenet.or.ke/images/9/97/Lab-6-dos.txt]]
 
RO/PM
 
RO/PM
 
|-
 
|-
Line 96: Line 183:
 
and PKI
 
and PKI
 
PM
 
PM
 +
 +
PKI Introduction [[http://training.kenet.or.ke/images/d/d7/PKI-Intro_V2.pdf]]
 +
 +
Comodo [[http://training.kenet.or.ke/images/e/ee/COMODO.pdf]]
 +
 +
Summary steps to generate SSl Certificates[[http://training.kenet.or.ke/images/2/25/Summary_steps_to_generating_SSL_cert.pdf]]
 
|  
 
|  
 
| SSL
 
| SSL
 
Configuration on  
 
Configuration on  
web server LABS
+
web server LABS SSL CSR CERT Lab [[http://training.kenet.or.ke/images/0/01/Lab1_SSL.txt]]
 +
 
 +
Apache install SSL Cert [[http://training.kenet.or.ke/images/4/40/Lab2_apacheSSL.txt]]
  
 
RO/MN
 
RO/MN
Line 107: Line 202:
 
|  
 
|  
 
|}
 
|}
 +
 +
 +
==Photo Gallery ==
 +
 +
The photo gallery can be accessed here: [[https://gallery.kenet.or.ke/index.php/Cyber-Security-Training---26th-30th-October-2015]]
 +
 +
==Recordings==
 +
 +
The training sessions were recorded and cab be accessed below:
 +
 +
 +
Day 1 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1445837657770 ]]
 +
 +
Day 2 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1445923075744]]
 +
 +
Day 3 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446009192069]]
 +
 +
Day 4 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446096383625]]
 +
 +
Day 5 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446183350578]]

Latest revision as of 08:58, 6 November 2015

Introduction

Cyber Security Workshop Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers with in the campus and also empower the network administrators on how to secure the campus network

Objective

This training will enable the network and system administrators run secure services within the campus network.

Who should Attend?

This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.

Cyber Security Training Topics

1. Day 1 : Introduction to Computer Security & Security domains

2. Day 2 : Web Security

3. Day 3 : Network and Wireless Security

4. Day 4 : Ethical hacking and penetration testing

5. Day 5 : Cryptography & Public Key Infrastructure

Day 1

8.30-9 Introduction & welcome

Introduction to Cyber Security

Security Domains

Security Architecture and Design/Designing with Cybersecurity in mind


Day 2

Web Attacks and Threats

Assessment and Mitigation

Securing Web Server/services labs

Day 3

Network Threats and Attack Types

Network Security and Defense with lab

Switching Security ?

Day 4

Ethical Hacking

Introduction

Footprinting and Recon

Social Engineering + Labs

Denial of Service + Labs

Day 5

Cryptography and PKI

SSL Configuration on web server LABS

Trainers

Peter Muia PM

Ronald Osure RO

Paul Nzau PN

Maureen Wanja MW

Martin Njau MN

Timetable

Day 8.30-10.30 10.30-10.50 10.50-13.00 1300-1400 1400-1600 1600-1620 1620-1800
Monday Welcome

and registration,[[1]] Introduction to Cyber Security,[[2]] MW

Tea Break Security

Domains,[[3]] PM

Lunch Security [[4]]

Architecture and Design RO

Tea Break Wireless

Security [[5]] MW

Tuesday Web

Attacks and Threats [[6]] PM

Assessment

and Mitigation PM

Securing

Web Server/services labs [[7]] [[8]] MN MN/RO

Securing

Web Server/services labs [[9]]

CSF LAB [[10]] RO/MN

Wednesday Network

Threats and Attack Typesn[[11]] PN

Firewalls
pf, iptables [[12]]

MN

Firewalls

and Defense with lab [[13]]

MN

Switching

Security[[14]]

PN

Thursday Ethical Hacking Introduction [[15]]

PM

Footprinting

and Recon [[16]] RO

Social,Engineering[[17]] + Labs

Ping Lab[[18]]

Dig Lab[[19]]

NMAP lab[[20]]

Banner Grabbing Lab[[21]]

Social Eng. LAB [[22]]

RO/PM

Denial

of Service [[23]] DOS Lab [[24]] RO/PM

Friday Cryptography

and PKI PM

PKI Introduction [[25]]

Comodo [[26]]

Summary steps to generate SSl Certificates[[27]]

SSL

Configuration on web server LABS SSL CSR CERT Lab [[28]]

Apache install SSL Cert [[29]]

RO/MN


Photo Gallery

The photo gallery can be accessed here: [[30]]

Recordings

The training sessions were recorded and cab be accessed below:


Day 1 - [[31]]

Day 2 - [[32]]

Day 3 - [[33]]

Day 4 - [[34]]

Day 5 - [[35]]