Difference between revisions of "Cyber Security Training"

From KENET Training
Jump to: navigation, search
(Course Outline)
(Who should Attend?)
 
(31 intermediate revisions by the same user not shown)
Line 1: Line 1:
=Course Outline=
+
=Introduction=
  
Cyber Security Training Topics
+
 
 +
Cyber Security Workshop Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers with in the campus and also empower the network administrators on how to secure the campus network
 +
 
 +
=Objective=
 +
 
 +
This training will enable the network and system administrators run secure services within the campus network.
 +
 
 +
=Who should Attend?=
 +
 
 +
This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.
 +
 
 +
=Cyber Security Training Topics=
  
 
1. Day 1 : Introduction to Computer Security & Security domains
 
1. Day 1 : Introduction to Computer Security & Security domains
Line 13: Line 24:
 
5. Day 5 : Cryptography & Public Key Infrastructure
 
5. Day 5 : Cryptography & Public Key Infrastructure
  
Day 1
+
==Day 1==
  
 
8.30-9 Introduction & welcome
 
8.30-9 Introduction & welcome
Line 23: Line 34:
 
Security Architecture and Design/Designing with Cybersecurity in mind
 
Security Architecture and Design/Designing with Cybersecurity in mind
  
Wireless Security
 
  
 +
==Day 2==
  
Day 2
+
Web Attacks and Threats
  
Web Attacks and Threats
 
 
Assessment and Mitigation
 
Assessment and Mitigation
 +
 
Securing Web Server/services labs
 
Securing Web Server/services labs
  
Day 3
+
==Day 3==
  
 
Network Threats and Attack Types
 
Network Threats and Attack Types
 +
 
Network Security and Defense with lab
 
Network Security and Defense with lab
 +
 
Switching Security ?
 
Switching Security ?
  
Day 4
+
==Day 4==
  
 
Ethical Hacking
 
Ethical Hacking
 +
 
Introduction
 
Introduction
 +
 
Footprinting and Recon
 
Footprinting and Recon
 +
 
Social Engineering + Labs
 
Social Engineering + Labs
 +
 
Denial of Service + Labs
 
Denial of Service + Labs
  
Day 5
+
==Day 5==
  
 
Cryptography and PKI
 
Cryptography and PKI
 +
 
SSL Configuration on web server LABS
 
SSL Configuration on web server LABS
  
Line 62: Line 80:
 
Maureen Wanja MW
 
Maureen Wanja MW
  
Martin Nzau MN
+
Martin Njau MN
  
 
=Timetable=
 
=Timetable=
Line 78: Line 96:
 
| Monday
 
| Monday
 
| Welcome
 
| Welcome
and registration,
+
and registration,[[http://training.kenet.or.ke/images/2/2d/Introduction.pdf]]
 
Introduction
 
Introduction
to Cyber Security,
+
to Cyber Security,[[http://training.kenet.or.ke/images/c/c9/01-intro-security.pdf]]
 
MW
 
MW
 
| Tea Break
 
| Tea Break
 
| Security
 
| Security
Domains,
+
Domains,[[http://training.kenet.or.ke/images/6/6f/Security_domains_final.pdf]]
 
PM
 
PM
 
| Lunch
 
| Lunch
| Security
+
| Security [[http://training.kenet.or.ke/images/c/c7/Designing-with-cyber-security-in-mind.pdf]]
 
Architecture and Design
 
Architecture and Design
 
RO
 
RO
 
| Tea Break
 
| Tea Break
 
| Wireless
 
| Wireless
Security
+
Security [[http://training.kenet.or.ke/images/4/47/NSRC_Wireless_3.1_Wireless_security_-_Principles_%26_Tools%282%29.pdf]]
 
MW
 
MW
 
|-
 
|-
 
| Tuesday
 
| Tuesday
 
| Web
 
| Web
Attacks and Threats  
+
Attacks and Threats [[http://training.kenet.or.ke/images/0/02/Web_Security_V2.pdf]]
 
PM
 
PM
 
|  
 
|  
Line 105: Line 123:
 
|  
 
|  
 
| Securing
 
| Securing
Web Server/services labs  
+
Web Server/services labs [[http://training.kenet.or.ke/images/e/e1/Securing-web-server-modsec-apache.pdf]]
 +
[[http://training.kenet.or.ke/images/c/c9/Csf-firewall-presentation.txt.pdf]]
 +
MN
 
MN/RO
 
MN/RO
 
|  
 
|  
 
| Securing
 
| Securing
Web Server/services labs
+
Web Server/services labs [[http://training.kenet.or.ke/images/8/8e/Mod-security-lab_updated.txt]]
 +
 
 +
CSF LAB [[http://training.kenet.or.ke/images/9/96/Csf-firewall-lab.txt]]
 
RO/MN
 
RO/MN
 
|-
 
|-
 
| Wednesday
 
| Wednesday
 
| Network
 
| Network
Threats and Attack Types
+
Threats and Attack Typesn[[http://training.kenet.or.ke/images/1/1d/Network_Threats_and_Attack_Types_-1.pdf]]
 
PN
 
PN
 
|  
 
|  
 
| Firewalls
 
| Firewalls
: pf, iptables
+
: pf, iptables [[http://training.kenet.or.ke/images/5/52/Firewalls-iptables-pf.pdf]]
 
MN
 
MN
 
|  
 
|  
 
| Firewalls
 
| Firewalls
 
and
 
and
Defense with lab
+
Defense with lab [[http://training.kenet.or.ke/images/7/7b/Iptables-lab.txt]]
  
 
MN
 
MN
 
|  
 
|  
 
| Switching
 
| Switching
Security
+
Security[[http://training.kenet.or.ke/images/f/f4/Switch_Security_-2.pdf]]
  
 
PN
 
PN
 
|-
 
|-
 
| Thursday
 
| Thursday
| Ethical Hacking Introduction
+
| Ethical Hacking Introduction [[http://training.kenet.or.ke/images/a/a8/Ethical_Hacking_Final.pdf]]
 
PM
 
PM
 
|  
 
|  
 
| Footprinting
 
| Footprinting
and Recon
+
and Recon [[http://training.kenet.or.ke/images/a/a1/Footprinting-recon-scanning.pdf]]
 
RO
 
RO
 
|  
 
|  
| Social,Engineering + Labs
+
| Social,Engineering[[http://training.kenet.or.ke/images/5/54/Presentation_Social_Engineering.pdf]] + Labs
 +
Ping Lab[[http://training.kenet.or.ke/images/4/4d/Lab-1-ping.txt]]
 +
 
 +
Dig Lab[[http://training.kenet.or.ke/images/a/aa/Lab-2-dig.txt]]
 +
 
 +
NMAP lab[[http://training.kenet.or.ke/images/9/92/Lab-3-nmap.txt]]
 +
 
 +
Banner Grabbing Lab[[http://training.kenet.or.ke/images/5/5c/Lab-4-banner-grabbing.txt]]
 +
 
 +
Social Eng. LAB [[http://training.kenet.or.ke/images/1/15/Lab-5-social-eng.txt]]
  
 
RO/PM
 
RO/PM
 
|  
 
|  
 
| Denial
 
| Denial
of Service + Labs
+
of Service [[http://training.kenet.or.ke/images/2/2b/Denial-of-service.pdf]] DOS Lab [[http://training.kenet.or.ke/images/9/97/Lab-6-dos.txt]]
 
RO/PM
 
RO/PM
 
|-
 
|-
Line 152: Line 183:
 
and PKI
 
and PKI
 
PM
 
PM
 +
 +
PKI Introduction [[http://training.kenet.or.ke/images/d/d7/PKI-Intro_V2.pdf]]
 +
 +
Comodo [[http://training.kenet.or.ke/images/e/ee/COMODO.pdf]]
 +
 +
Summary steps to generate SSl Certificates[[http://training.kenet.or.ke/images/2/25/Summary_steps_to_generating_SSL_cert.pdf]]
 
|  
 
|  
 
| SSL
 
| SSL
 
Configuration on  
 
Configuration on  
web server LABS
+
web server LABS SSL CSR CERT Lab [[http://training.kenet.or.ke/images/0/01/Lab1_SSL.txt]]
 +
 
 +
Apache install SSL Cert [[http://training.kenet.or.ke/images/4/40/Lab2_apacheSSL.txt]]
  
 
RO/MN
 
RO/MN
Line 163: Line 202:
 
|  
 
|  
 
|}
 
|}
 +
 +
 +
==Photo Gallery ==
 +
 +
The photo gallery can be accessed here: [[https://gallery.kenet.or.ke/index.php/Cyber-Security-Training---26th-30th-October-2015]]
 +
 +
==Recordings==
 +
 +
The training sessions were recorded and cab be accessed below:
 +
 +
 +
Day 1 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1445837657770 ]]
 +
 +
Day 2 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1445923075744]]
 +
 +
Day 3 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446009192069]]
 +
 +
Day 4 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446096383625]]
 +
 +
Day 5 - [[http://web.conference.kenet.or.ke/playback/presentation/0.9.0/playback.html?meetingId=b37f6ddcefad7e8657837d3177f9ef2462f98acf-1446183350578]]

Latest revision as of 08:58, 6 November 2015

Introduction

Cyber Security Workshop Security within the campus network has become an area that the network and system administrators need to focus more on. This workshop will focus on empowering the system administrators on how to secure the services and servers with in the campus and also empower the network administrators on how to secure the campus network

Objective

This training will enable the network and system administrators run secure services within the campus network.

Who should Attend?

This course is designed for system and network administrators who are interested in learning and implementing best practices for running a secure and stable campus network.

Cyber Security Training Topics

1. Day 1 : Introduction to Computer Security & Security domains

2. Day 2 : Web Security

3. Day 3 : Network and Wireless Security

4. Day 4 : Ethical hacking and penetration testing

5. Day 5 : Cryptography & Public Key Infrastructure

Day 1

8.30-9 Introduction & welcome

Introduction to Cyber Security

Security Domains

Security Architecture and Design/Designing with Cybersecurity in mind


Day 2

Web Attacks and Threats

Assessment and Mitigation

Securing Web Server/services labs

Day 3

Network Threats and Attack Types

Network Security and Defense with lab

Switching Security ?

Day 4

Ethical Hacking

Introduction

Footprinting and Recon

Social Engineering + Labs

Denial of Service + Labs

Day 5

Cryptography and PKI

SSL Configuration on web server LABS

Trainers

Peter Muia PM

Ronald Osure RO

Paul Nzau PN

Maureen Wanja MW

Martin Njau MN

Timetable

Day 8.30-10.30 10.30-10.50 10.50-13.00 1300-1400 1400-1600 1600-1620 1620-1800
Monday Welcome

and registration,[[1]] Introduction to Cyber Security,[[2]] MW

Tea Break Security

Domains,[[3]] PM

Lunch Security [[4]]

Architecture and Design RO

Tea Break Wireless

Security [[5]] MW

Tuesday Web

Attacks and Threats [[6]] PM

Assessment

and Mitigation PM

Securing

Web Server/services labs [[7]] [[8]] MN MN/RO

Securing

Web Server/services labs [[9]]

CSF LAB [[10]] RO/MN

Wednesday Network

Threats and Attack Typesn[[11]] PN

Firewalls
pf, iptables [[12]]

MN

Firewalls

and Defense with lab [[13]]

MN

Switching

Security[[14]]

PN

Thursday Ethical Hacking Introduction [[15]]

PM

Footprinting

and Recon [[16]] RO

Social,Engineering[[17]] + Labs

Ping Lab[[18]]

Dig Lab[[19]]

NMAP lab[[20]]

Banner Grabbing Lab[[21]]

Social Eng. LAB [[22]]

RO/PM

Denial

of Service [[23]] DOS Lab [[24]] RO/PM

Friday Cryptography

and PKI PM

PKI Introduction [[25]]

Comodo [[26]]

Summary steps to generate SSl Certificates[[27]]

SSL

Configuration on web server LABS SSL CSR CERT Lab [[28]]

Apache install SSL Cert [[29]]

RO/MN


Photo Gallery

The photo gallery can be accessed here: [[30]]

Recordings

The training sessions were recorded and cab be accessed below:


Day 1 - [[31]]

Day 2 - [[32]]

Day 3 - [[33]]

Day 4 - [[34]]

Day 5 - [[35]]