Difference between revisions of "Cyber Security Training"

From KENET Training
Jump to: navigation, search
(Timetable)
(Who should Attend?)
 
(4 intermediate revisions by the same user not shown)
Line 1: Line 1:
 +
=Introduction=
 +
 +
 +
Cyber Security Workshop Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers with in the campus and also empower the network administrators on how to secure the campus network
 +
 +
=Objective=
 +
 +
This training will enable the network and system administrators run secure services within the campus network.
 +
 +
=Who should Attend?=
 +
 +
This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.
 +
 +
=Cyber Security Training Topics=
 +
 +
1. Day 1 : Introduction to Computer Security & Security domains
 +
 +
2. Day 2 : Web Security
 +
 +
3. Day 3 : Network and Wireless Security
 +
 +
4. Day 4 : Ethical hacking and penetration testing
 +
 +
5. Day 5 : Cryptography & Public Key Infrastructure
 +
 +
==Day 1==
 +
 +
8.30-9 Introduction & welcome
 +
 +
Introduction to Cyber Security
 +
 +
Security Domains
 +
 +
Security Architecture and Design/Designing with Cybersecurity in mind
 +
 +
 +
==Day 2==
 +
 +
Web Attacks and Threats
 +
 +
Assessment and Mitigation
 +
 +
Securing Web Server/services labs
 +
 +
==Day 3==
 +
 +
Network Threats and Attack Types
 +
 +
Network Security and Defense with lab
 +
 +
Switching Security ?
 +
 +
==Day 4==
 +
 +
Ethical Hacking
 +
 +
Introduction
 +
 +
Footprinting and Recon
 +
 +
Social Engineering + Labs
 +
 +
Denial of Service + Labs
 +
 +
==Day 5==
 +
 +
Cryptography and PKI
 +
 +
SSL Configuration on web server LABS
 +
 
=Trainers=
 
=Trainers=
  
Line 134: Line 204:
  
  
Photo Gallery [[https://gallery.kenet.or.ke/index.php/Cyber-Security-Training---26th-30th-October-2015]]
+
==Photo Gallery ==
 +
 
 +
The photo gallery can be accessed here: [[https://gallery.kenet.or.ke/index.php/Cyber-Security-Training---26th-30th-October-2015]]
 +
 
 +
==Recordings==
 +
 
 +
The training sessions were recorded and cab be accessed below:
 +
 
 +
 
 +
Day 1 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1445837657770 ]]
 +
 
 +
Day 2 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1445923075744]]
 +
 
 +
Day 3 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446009192069]]
 +
 
 +
Day 4 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446096383625]]
 +
 
 +
Day 5 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446183350578]]

Latest revision as of 08:58, 6 November 2015

Introduction

Cyber Security Workshop Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers with in the campus and also empower the network administrators on how to secure the campus network

Objective

This training will enable the network and system administrators run secure services within the campus network.

Who should Attend?

This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.

Cyber Security Training Topics

1. Day 1 : Introduction to Computer Security & Security domains

2. Day 2 : Web Security

3. Day 3 : Network and Wireless Security

4. Day 4 : Ethical hacking and penetration testing

5. Day 5 : Cryptography & Public Key Infrastructure

Day 1

8.30-9 Introduction & welcome

Introduction to Cyber Security

Security Domains

Security Architecture and Design/Designing with Cybersecurity in mind


Day 2

Web Attacks and Threats

Assessment and Mitigation

Securing Web Server/services labs

Day 3

Network Threats and Attack Types

Network Security and Defense with lab

Switching Security ?

Day 4

Ethical Hacking

Introduction

Footprinting and Recon

Social Engineering + Labs

Denial of Service + Labs

Day 5

Cryptography and PKI

SSL Configuration on web server LABS

Trainers

Peter Muia PM

Ronald Osure RO

Paul Nzau PN

Maureen Wanja MW

Martin Njau MN

Timetable

Day 8.30-10.30 10.30-10.50 10.50-13.00 1300-1400 1400-1600 1600-1620 1620-1800
Monday Welcome

and registration,[[1]] Introduction to Cyber Security,[[2]] MW

Tea Break Security

Domains,[[3]] PM

Lunch Security [[4]]

Architecture and Design RO

Tea Break Wireless

Security [[5]] MW

Tuesday Web

Attacks and Threats [[6]] PM

Assessment

and Mitigation PM

Securing

Web Server/services labs [[7]] [[8]] MN MN/RO

Securing

Web Server/services labs [[9]]

CSF LAB [[10]] RO/MN

Wednesday Network

Threats and Attack Typesn[[11]] PN

Firewalls
pf, iptables [[12]]

MN

Firewalls

and Defense with lab [[13]]

MN

Switching

Security[[14]]

PN

Thursday Ethical Hacking Introduction [[15]]

PM

Footprinting

and Recon [[16]] RO

Social,Engineering[[17]] + Labs

Ping Lab[[18]]

Dig Lab[[19]]

NMAP lab[[20]]

Banner Grabbing Lab[[21]]

Social Eng. LAB [[22]]

RO/PM

Denial

of Service [[23]] DOS Lab [[24]] RO/PM

Friday Cryptography

and PKI PM

PKI Introduction [[25]]

Comodo [[26]]

Summary steps to generate SSl Certificates[[27]]

SSL

Configuration on web server LABS SSL CSR CERT Lab [[28]]

Apache install SSL Cert [[29]]

RO/MN


Photo Gallery

The photo gallery can be accessed here: [[30]]

Recordings

The training sessions were recorded and cab be accessed below:


Day 1 - [[31]]

Day 2 - [[32]]

Day 3 - [[33]]

Day 4 - [[34]]

Day 5 - [[35]]