Difference between revisions of "Cyber Security Training"

From KENET Training
Jump to: navigation, search
(Timetable)
(Timetable)
Line 89: Line 89:
 
|  
 
|  
 
| Footprinting
 
| Footprinting
and Recon
+
and Recon [[http://training.kenet.or.ke/images/a/a1/Footprinting-recon-scanning.pdf]]
 
RO
 
RO
 
|  
 
|  
| Social,Engineering + Labs
+
| Social,Engineering[[http://training.kenet.or.ke/images/5/54/Presentation_Social_Engineering.pdf]] + Labs
  
 
RO/PM
 
RO/PM
 
|  
 
|  
 
| Denial
 
| Denial
of Service + Labs
+
of Service [[http://training.kenet.or.ke/images/2/2b/Denial-of-service.pdf]] Labs
 
RO/PM
 
RO/PM
 
|-
 
|-

Revision as of 07:26, 29 October 2015

Trainers

Peter Muia PM

Ronald Osure RO

Paul Nzau PN

Maureen Wanja MW

Martin Njau MN

Timetable

Day 8.30-10.30 10.30-10.50 10.50-13.00 1300-1400 1400-1600 1600-1620 1620-1800
Monday Welcome

and registration,[[1]] Introduction to Cyber Security,[[2]] MW

Tea Break Security

Domains,[[3]] PM

Lunch Security [[4]]

Architecture and Design RO

Tea Break Wireless

Security [[5]] MW

Tuesday Web

Attacks and Threats [[6]] PM

Assessment

and Mitigation PM

Securing

Web Server/services labs [[7]] [[8]] MN MN/RO

Securing

Web Server/services labs [[9]]

CSF LAB [[10]] RO/MN

Wednesday Network

Threats and Attack Typesn[[11]] PN

Firewalls
pf, iptables [[12]]

MN

Firewalls

and Defense with lab [[13]]

MN

Switching

Security[[14]]

PN

Thursday Ethical Hacking Introduction [[15]]

PM

Footprinting

and Recon [[16]] RO

Social,Engineering[[17]] + Labs

RO/PM

Denial

of Service [[18]] Labs RO/PM

Friday Cryptography

and PKI PM

SSL

Configuration on web server LABS

RO/MN