Difference between revisions of "Cyber Security Training"

From KENET Training
Jump to: navigation, search
(Timetable)
(Timetable)
Line 64: Line 64:
 
| Wednesday
 
| Wednesday
 
| Network
 
| Network
Threats and Attack Types
+
Threats and Attack Typesn[[http://training.kenet.or.ke/images/1/1d/Network_Threats_and_Attack_Types_-1.pdf]]
 
PN
 
PN
 
|  
 
|  
Line 78: Line 78:
 
|  
 
|  
 
| Switching
 
| Switching
Security
+
Security[[http://training.kenet.or.ke/images/f/f4/Switch_Security_-2.pdf]]
  
 
PN
 
PN

Revision as of 05:29, 28 October 2015

Trainers

Peter Muia PM

Ronald Osure RO

Paul Nzau PN

Maureen Wanja MW

Martin Njau MN

Timetable

Day 8.30-10.30 10.30-10.50 10.50-13.00 1300-1400 1400-1600 1600-1620 1620-1800
Monday Welcome

and registration,[[1]] Introduction to Cyber Security,[[2]] MW

Tea Break Security

Domains,[[3]] PM

Lunch Security [[4]]

Architecture and Design RO

Tea Break Wireless

Security [[5]] MW

Tuesday Web

Attacks and Threats [[6]] PM

Assessment

and Mitigation PM

Securing

Web Server/services labs [[7]] [[8]] MN MN/RO

Securing

Web Server/services labs [[9]] RO/MN

Wednesday Network

Threats and Attack Typesn[[10]] PN

Firewalls
pf, iptables

MN

Firewalls

and Defense with lab

MN

Switching

Security[[11]]

PN

Thursday Ethical Hacking Introduction

PM

Footprinting

and Recon RO

Social,Engineering + Labs

RO/PM

Denial

of Service + Labs RO/PM

Friday Cryptography

and PKI PM

SSL

Configuration on web server LABS

RO/MN