007

Cyber Security Fundamentals & how to prevent from hacker

Package including 2 courses :

  • Cyber Security Fundamentals including Demo and Hands-on training : Provide insights into the modern security environment and Hands-on training
  • Don’t Let the Hackers In

Référence de la formation

KBPSEO1

Niveau

  • Beginner
  • Intermediate

Nombre de jours

12 Days, 4H/day

Prix

3.893,10 € HT

Lieu de la formation

V: v-learning, virtual class



Pre-requis

  • Understanding computer software and architecture
  • Basic Knowledge of IP Networking

Public

  • Anyone who needs to learn about anti-hacking techniques
  • High level Managers, Presale Managers, IT Managers, QA and Technical Support

Objectifs de la formation

#Course Objectives
#Course-1

The main goal of the Cybersecurity course is to cover some fundamentals Cybersecurity topics, to provide insights into the modern security environment,
the cyber threat landscape and attacker mentality, including how attackers work, what tools they use, what vulnerabilities they target and what they’re really after.
Course graduates may be a part of QA teams, Validation teams and development teams.

At the end of this "Cyber ​​Fundamentals including Demo and Hands-on training" training, you will be able and hand-on to:

  • Layers vulnerabilities
  • Inspection and interception tools
  • NAT – Topology hiding
  • Application evolution and security issues
  • Net work issues
  • Net work and vulnerability scanning
  • Offensive Security – Kali Linux
  • Virtual machines
  • NMAP
  • NCAT
  • Firewall
  • Cryptography
  • Penetration Tests
  • Cloud Security
  • Web application Vulnerability/ Firewall
  • IDS/IPS events detection
  • SEIM Demo
  • Computer forensics incl. Demo
  • Cyber security in organizations
  • AI NLP
  • Future CRM CEM
#Course-2

Computer and information security is of utmost importance in today’s technological (and political?) environment. The threats imposed by
viruses, Trojan horses and other software malware is well known, as is the problem of the hackers – both those programmers who breaks into computer
systems because of the challenge imposed and those who break in for criminal or terrorist purposes – to steal, change or destroy information.

In this “anti-hacker” course, participants learn about the basic threats hackers pose and what is needed in order to protect computer
systems from them.

Contenu du cours

Cyber Security Fundamentals including Demo and Hands-on training
Meeting #1

Chapter Description
Introduction to Cyber Security
  • Hacking History
  • Cyber Attacks Trends
  • Cloud Security Challenges
  • External and Internal threats
  • Threats and attacks
  • Security Criteria’s
  • Threat Taxonomy Models summary
Basics of Networking
  • Network Definitions and Topology
  • LAN, WAN, MAN
  • Synchronized and Unsynchronized modes
  • Network speed – bit rate
  • Bandwidth and the Noise factor
  • Errors handling
  • Utilization and coding efficiency
OSI layer model
  • The need for Standards
  • Layers model and protocols
  • OSI Model
  • OSI Layers responsibilities
Summary including Q&A
  • Summary including Q&A

 

Meeting #2

Chapter Description
The physical layer and vulnerabilities
  • Twisted Pair, Coax, Fiber Optic, Satellite, Microwave
Data Link Layer (IEEE Ethernet) – the 2nd Layer
  • Ethernet Common Topologies
  • CSMA (Carrier Sense Multiple Access)Protocol
  • Ethernet Frame Structure
  • MAC Addresses
  • MAC Spoofing for attacks
The 3rd Layer and IP vulnerabilities
  • Network Layer (IP)
  • IP Header Structure
  • MTU and Fragmentation process
  • ARP and DHCP security issues
  • DOS attacks including fragmented packets
Summary including Q&A
  • Summary including Q&A

 

Meeting #3

Chapter Description
The 4th Layer- Transportation Layers
  • UDP
  • TCP
  • SCTP
Inspection and interception Tool – Hands-on
  • Introduction to Wireshark
  • Getting Started
  • Capturing Packets
  • Color Coding
  • Sessions Filtering methods
Internet working
  • HUB, Switch and Router
  • Routing techniques and Algorithms
  • Challenges - High availability and LB
Summary including Q&A
  • Summary including Q&A

 

Meeting #4

Chapter Description
NAT – Topology hiding • NAT types / NAT challenges
• Universal Plug and Play (UPNP)
• Simple Traversal of UP through NAT (STUN)
• Traversal Using Relay NATs (TURN)
Inspection and interception Tool – Hands-on • Inspecting Packets
• Network Topology studying
• MAC Addresses and manufacturers
• 3rd layer and IP Addresses analysis
• Open ports at 4th Layer Analysis
Applications Evolution and security issues • HTTP, Telnet, FTP, Email
• Media Applications – VoIP
• Collaboration
Summary including Q&A • Summary including Q&A

 

Meeting #5

Chapter Description
Networking Issues • Quality of Service
• Class of Service
• Related DoS attacks
Basics of Security Management • Security Layers
• Defending concept according OSI Layers
• Security modules and functionalities
• Server Hardening
MiTM challenge and confidentiality solutions • What is TLS
• What is IPsec
• Applications over TLS and IPsec
Summary including Q&A • Summary including Q&A

 

Meeting #6

Chapter

Description
Inspection and interception Tool – Hands-on • Call flow analysis
• Traffic analysis and eavesdropping
• Numbers Harvesting
• Conferences eavesdropping
• Password capture
Offensive security: Kali Linux • What is Kali Linux?
• Some Kali Facts
• Installing Kali Linux
• Tools Categories
• Kali Desktop
• Kali Top Tools
• Kali Linux Alternatives
Basic Linux commands • Basic Linux commands
Summary including Q&A • Summary including Q&A

 

Meeting #7

Chapter Description
Virtual Machines • VMWare
• Virtual Box
Virtual Machines – Hands-on Part 1 • Virtual machine installation
• Setting the VM
• Configuration process
Kali Linux – Hands-on Part 2 • Download and install Kali Linux on VM
• Setting and preparations
• Networking and interconnection tests
Summary including Q&A • Summary including Q&A

 

Don’t Let the Hackers In

Table 1: KSE003 - Course Contents
Chapter Description
Introduction • What’s there to worry about
Organizational Threats • Users
• Host
• Server
• Perimeter
Defense Methodologies • Defense in depth
• IATF
• ISSE
• Technology environment defined
Defense Tools • Users
• Host
• Server
• Perimeter
Security Assessment Demonstration • Concepts
• Tools
The End • Summary
• Q&A
• Couse’s Evaluation


 


 

Dates


07 Juillet 2020 au 29 Juillet 2020


11 Août 2020 au 31 Août 2020


NOTE :

Package including 2courses, we offer 10% off including in the price


Des questions ?

+33 (0) 950 20 91 64


Inscription ou Demande de devis