Cyber security

cyber security

Cyber security

Free open session on Cyber security – 1st July 2018 at 2:00 PM

Prerequisites:

There are no prerequisites for this course, however, participants are expected to have a basic understanding of computers and the internet.

 

Course Details:

Day 1

Computer system components,

input devices, primary memory,

CPU, operating systems (Windows, Linux & Mac),

different types of storage,

file systems (FAT & NTFS),

memory management.

Switched networks,

packet switching vs circuit switching,

packet routing delivery,

routing,

inter networking standards,

OSI model, and 7 layers.

TCP/IP protocol suite,

Types of addresses,

Physical address,

Logical address,

IPv4, IPv6, Port address, Specific address,

Network access control

Day 2

Network fundamentals,

Network types,

Peer-to-peer networking (advantages & disadvantages),

Server based networks (advantages & disadvantages),

Local area networks, Wide area networks,

Personal area networks,

Home area networks,

WAN vs LAN, DHCP

How does data travel across the internet?

End to end examples for web browsing, Send emails,

Using applications – explaining internet architecture,

Routing,

DNS

Secure planning,

Policies and mechanisms,

Active Directory Structure,

Introducing Group Policy (containers, templates, GPO),

Security and network layers,

IPSEC, SSL / TLS (flaws and comparisons) SSH,

Firewalls (packet filtering, state full inspection),

Application gateways, ACL’s

VoIP, Wireless LAN,

Network Analysis and Sniffing,

Wireshark

Virtualisation definitions,

Virtualisation models,

Terminologies, Virtual models,

Virtual platforms,

What is cloud computing,

Cloud essentials, Cloud service models,

Security & privacy in the cloud, Multi-tenancy issues,

Infrastructure vs data security, Privacy concerns.

Day 3

Security Information Event Management (SIEM) processes and architecture,

SIEM features, User activity monitoring,

Real time event correlation, Log retention, File integrity monitoring,

Security auditing & automation auditing,

What to audit, Implementation guidelines, What to collect,

Windows Event Log, UNIX Syslog, Logging at an application level,

Audit trail analysis, Approaches to data analysis.

Cyber exploits, Understanding Malware,

Cross site scripting, SQL Injection,

DDOS, Input validation, Buffer-overflow,

Targeted attacks and stages of an advanced persistent threat (APT)

Uses of encryption technology, Symmetric / Asymmetric key encryption,

Public and private keys, Weaknesses, decryption, hashing,

Digital signatures, PKI, certificates authorities,

Data at rest and in transit, SSL

Knowledge check, scenario exercise questions based upon days 1 – 3 delivery.

Day 4

Legislation, Chain of Custody,

Reporting and Assurance within the context of a legal framework. Inc.

Overview of Data Protection Act (DPA 1998) and the EU General Data Protection Regulation (GDPR).

Internet foundations, Domain name system, Whois (Inc. worked example),

Trace route, Internet analysis, search engines,

Tools for finding information on people and companies,

Username searchers, email lookups, Disposable emails,

Passwords, internet communities and culture, deep web directories and leaking websites.

Overview – the drivers for UK Information Assurance, initiatives and programmes, risk assessment vs risk management, risk components.

Business context and risk management approach, risk management lifecycle, who delivers risk management – where in the lifecycle, understanding the context, legal and regulatory.

Risk Treatment – Identify the ways of treating risks, methods of gaining assurance, understanding the nature of residual risk, collecting evidence that supports decisions, risk management decisions.

Physical security – lighting, CCTV, fencing, Intrusion detection,

Screening, Destruction, UPS and generators, Access and control of entry

People, employees, contractors, customers (resource, vulnerability, threat),

Recruitment, screening, Social Engineering,

Common People Exploits, T&C’s, in role, change in role,

Termination, insider threat, supply chain challenges.

Day 5

HMG perspective – CPA, CAPS, FIPS, CE, Common Criteria, SPF.

Summary of common industry standards. (Inc. OWASP, SISO27001, PCI-DSS)

Principles for software security, (securing the weakest link, Defence in depth, failing securely, least privilege, separation of privilege), IA Design Principles

Secure by Design, SDLC

What is Threat Modelling,

Threat Modelling Process,

Coding to a Threat Model

Risk Mitigation Options

Reduce the attack surface, Defense in Depth, Test security, weaknesses and vulnerabilities, secure coding, learn from mistakes

Security Design Architecture,

Enterprise Design Frameworks (TOGAF, DODAF, MODAF, ZACHMAN, SABSA),

Patterns (CESG, Open Security Architecture)

Knowledge check, scenario exercise questions based upon days 4 – 5 delivery.

Contact Us

IT Trainer Guru
3rd Floor, Office no 11,
Alperton House, Bridgewater Road,
London HA0 1EH
United Kingdom

Phone : 02034894060
Call/Whatsapp : 07440631224/07440575351
Skype : ITTrainer.Guru
Fax: 07440631224

Why Us

Please leave your email or phone no so we can email or whatsapp course content and invite you to attend free orientation session. to find out more call or whatsapp on +44 7440631224

Inquiry Form

  • This field is for validation purposes and should be left unchanged.