Cyber Security Foundation 2015

Cyber Security Foundation Training Cyber Security Foundation Training
By TED Integrated
System Security:

Cyber Security Foundation 2015

“Learn to Investigate cyber security threats and master techniques needed to protect your network.”

By TED Integrated


PSMB Certified Training Provider
Request for In-house TrainingRequest for In-house Training
Register for Public Training Public program not yet available
Email Customer Service [email protected] Contact Customer Service +603-2386-7788
Course Title:
Cyber Security Foundation 2015
Training Category:
Information Technology
Target Audience:
IT Administrator, System Engineers, Webmasters, CTOs, CIOs, IT heads and managers.
Duration:
3 Days
For In-house Training
Request for Quotation Request for Quotation
For Other Inquiries
Contact TED Integrated
Contact customer service +603-2386-7788
Email customer service [email protected]
Delivery Methods
  • Language: English
  • PowerPoint Presentation
  • Presentation Handouts
  • Computer Lab Work
  • Certificate of Participation
*Terms & Conditions

Course Introduction ›

This is a 3-Day Cyber Security Foundation 2015 training for all IT personnel who concern about the infrastructure security of their organization. In this cyber security training, you'll gain the awareness of all challenges in designing a secure system for your oganization. You'll also learn the current trends of cyber security threats and their impact on company losses. In this workshop, you'll also have a chance to deal with live viruses, such as botnets, worms, and Trojan Horses.

To request for in-house training, click on the Request for In-house Training link as displayed above for quotation. For a complete course cotent and more information about this course, feel free to contact the training provider as shown above. If the public program is available, you can request for a registration online by clicking on the Register for Public Training link. If the link is disabled, it simply means it has yet to be available for public. You can contact the training provider for further inquiry.

Course Objectives ›

At the end of this cyber security workshop, participant should be able to understand the following:

  • Understanding TCP/IP
  • Vulnerability Assessment
  • Cyber Awareness
  • Cyber Scanning
  • Cyber Attacks and Passwords
  • Cyber Attacks and Backdoors
  • Risk Assessment
  • Security Policies
  • Host Security
  • Covert Communications
  • Authentication and Cryptography
  • Snort IDS
  • Forensic Analysis
  • Business Continuity Plan

Course Outline ›

DAY 1

Workshop 1: Workshop Setup

  • Access the Virtual Workshop Environment
  • Configure BackTrack and Redhat Security Spin
  • Rebuild Your Physical Computer

Workshop 2: Understanding TCP/IP

  • Convert Binary to Decimal
  • Convert Decimal to Binary
  • Convert Hexadecimal to Decimal
  • Analyze Wireshark Traffic

Workshop 3: Vulnerability Assessment

  • Use Nessus
  • Identify Coding Issues
DAY 2

Workshop 4: Cyber Awareness

  • Identifying Social Engineering Attacks
  • Detect Phishing Using Internet-Based Tools

Workshop 5: Cyber Scanning

  • Trace Domains and IP Addresses
  • Map Web Site Content with Teleport Pro
  • Use Cheops for Graphical Display of Network
  • Use GFI LanGuard
  • Scan Using Nmap
  • Scan Using Zenmap
  • Perform Banner Grabbing

Workshop 6: Cyber Attacks and Passwords

  • Crack Passwords via the GUI
  • Crack Passwords via the CLI
  • Hide Files with NTFS
    Workshop 7: Cyber Attacks and Backdoors
  • Perform Netcat Banner Grabbing
  • Perform Netcat Shoveling
  • Use Netcat to Port Scan
  • Create and Detect a Trojan
DAY 3

Workshop 8: Risk Assessment

  • Review Profile and Complete a Criticality Ranking
  • Complete a Criticality Review
  • Complete a Threat Profile
  • Evaluate the Support Policy and Cost

Workshop 9: Security Policies

  • Review Security Policies
  • Develop an Incident Response Policy

Workshop 10: Host Security

  • Use the RECUB Trojan
  • Identify the RECUB Service
  • Harden the System

Workshop 11: Covert Communications

  • Hide Messages Using S-Tools
  • Use Spam Mimic

Contact us now ›

  • Course content customization
  • In-house training request
  • Available public program
  • Consultation services
  • Other inquiries
Contact Customer ServiceCall : +603-2386-7788
Email Customer Service E-mail : [email protected]

Related Courses ›

Published by: ,