Telecom

Fundamentals of Wireless Communications

Course Overview

The main goal of the Cyber security course is to cover some fundamentals cyber security topic, to provide insights into the modern security environment, the cyber threat landscape and attacker mentality, including how attackers work, what tools they use, what vulnerabilities they target and what they’re really after.

Who Should Attend

High level Managers, Presale Managers, IT Managers, QA and Technical Support.

Prerequisite

Basic Knowledge of IP Networking

Course Outline

Day 1

1. Introduction to Cyber Security
  Hacking History
• Cyber Attacks Trends
• External and Internal threats
• Hackers Types
• Threats and attacks
• Security Criteria’s
• Threat Taxonomy Models summary

2. Basics of Security Management
• Security Layers
• Defending concept according OSI Layers
• Security modules and functionalities
• NAT- Network Address Translation
• Firewalls Types
• Network Access Control (NAC)
• IDS and IPS
• Encryption protocols: IPSec, TLS and SRTP
• Replay Attacks Protection
• Server Hardening

3. TCP/IP vulnerabilities 
• Network Layer (IP) services – 3rd Layer
• IP Header Structure
• MTU and Fragmentation process
• IP Addressing – issues and solutions
- ARP, DHCP, NAT
• Transportation Layers: TCP, UDP, SCTP

4. Introduction to Cryptography
• Public and Private keys
• Symmetric and Asymmetric encryption keys
• DES and Triple DES
• AES and RSA methods

5. MiTM challenge and confidentiality solutions
• What is TLS
• What is IPsec
• Applications over TLS and IPsec

6. Inspection and interception Tool – Hands-on
• Introduction to Wireshark
• Getting Started
• Capturing Packets
• Color Coding
• Sessions Filtering methods
• Inspecting Packets
• Network Topology studying
• MAC Addresses and manufacturers
• 3rd layer and IP Addresses analysis
• Open ports at 4th Layer Analysis
• Call flow analysis
• Traffic analysis and eavesdropping
• Live capture and real-time interception


Day 2

7. Firewall
• PFF, Proxy GW, Stateful Inspection
• Management menu
• Rules and policy

8.IPTables Firewall
• What is IPTables?
• Chains and Chain Policy
• Creating Rules and Rules Examples
• Connection States
• User Defined Chains
• Logging Events/Packets
• Advanced Examples
• Managing IPTables Firewall

9. Network and Vulnerabilities Scanning
• Basic Scanning Techniques
• Discovery Option
• Operation System Detection
• Nmap Script Engine
• Nmap GUI
• Vulnerabilities Information Sources
• Vulnerabilities Scanners

10. Kali Linux
• What is Kali Linux?
• Some Kali Facts
• Installing Kali Linux
• Tools Categories
• Kali Desktop
• Kali Top Tools
• Kali Linux Alternatives

11. Network Scanning - Hands-on Session
• NMAP - Networks Scanning for Topology analysis and network Mapping
• OpenVAS for vulnerabilities scanning and analysis


12. Services inspection – Hands-on
• Numbers Harvesting
• Conferences eavesdropping
• Password capture


13. Firewall - Hands-on Session
• FW Rules setting
• Denial of Service and DDoS attacks
• Port scanning and vulnerabilities
• Blocking scenarios 

Day 3

14. Certificates and Authentication process
• Certificates and X.509 ITU-T Standard
• HTTP digest authentication
• Authentication scheme for a trusted domain
• Authentication Challenges

15. Penetration Testing
• What is Penetration Testing?
• Reasons for Pen Testing
• Hackers and Pen Testing
• Vulnerabilities
• What do we test
• Pen Testing Phases
• Types of Testing
• Areas of Penetration Tests
• References

16. Network Penetration - Hands-on Session

17. Wireless Network penetration- Hand-on Session
• John the Ripper/Crunch
• Brute-force search
• Brute-force attack
• Password cracking/ WPA2 crack

18. Security Summary
• Policy enforcement
• Organization Security personal and hierarchic
• Chief Information Security Officer – CISO
• Penetration Tester / Hacker
• Forensics
• Information Security Administrator: ISAD
• Information Security Auditor
• Application Development Security Expert
• InfoSec Systems Project Manager
• InfoSec Incident Expert
• Physical InfoSec Expert
• Behavior Analysis Expert and To-Do-List

19. Summary

Partners 

Upcoming Program

TechSource Systems is the Sole Distributor and Authorised Training Partner of Mathworks Products

  • Facebook Social Icon
  • Twitter Social Icon
  • Google+ Social Icon
  • YouTube Social  Icon
  • Pinterest Social Icon
  • Instagram Social Icon
All rights reserved. Copyright © TechSource Systems Pte Ltd. Company Registration No. 199603163W
linkedin.png
  • Facebook