SECURITY
Cyber Security Certification
GIAC PENETRATION TESTER - GPEN(SEC-560)
3 Days
This 3-day Intensive hands-on training is designed primarily for IT professionals who have some experience with Windows Server. It is designed for professionals who will be responsible for managing storage and compute by using Windows Server 2016, and who need to understand the scenarios, requirements, and storage and compute options that are available and applicable to Windows Server 2016.
​
Module 1: Installing, upgrading, and migrating servers and workloads
Module 2: Configuring local storage
Module 3: Implementing enterprise storage solutions
Module 4: Implementing Storage Spaces and Data Deduplication
Module 5: Installing and configuring Hyper-V and virtual machines
Module 6: Deploying and managing Windows Server and Hyper-V containers
Module 7: Overview of high availability and disaster recovery
Module 8: Implementing and managing failover clustering
Module 9: Implementing failover clustering for Hyper-V virtual machines
Module 10: Implementing Network Load Balancing
Module 11: Creating and managing deployment images
Module 12: Managing, monitoring, and maintaining virtual machine installations
CERTIFIED INFORMATION SECURITY MANAGER (CISM)
3 Days
This 3-day Intensive hands-on training provides the fundamental networking skills required to deploy and support Windows Server 2016 in most organizations. It covers IP fundamentals, remote access technologies, and more advanced content including Software Defined Networking.
​
Module 1: Planning and implementing an IPv4 network
Module 2: Implementing DHCP
Module 3: Implementing IPv6
Module 4: Implementing DNS
Module 5: Implementing and managing IPAM
Module 6: Remote access in Windows Server 2016
Module 7: Implementing DirectAccess
Module 8: Implementing VPNs
Module 9: Implementing networking for branch offices
Module 10: Configuring advanced networking features
Module 11: Implementing Software Defined Networking
OSCP PENETRATION TESTING WITH KALI
3 Days
This 3-day intensive hands-on training teaches IT Pros how to deploy and configure Active Directory Domain Services (AD DS) in a distributed environment, how to implement Group Policy, how to perform backup and restore, and how to monitor and troubleshoot Active Directory–related issues with Windows Server 2016. Additionally, this course teaches how to deploy other Active Directory server roles such as Active Directory Federation Services (AD FS) and Active Directory Certificate Services (AD CS).
​
Module 1: Installing and configuring domain controllers
Module 2: Managing objects in AD DS
Module 3: Advanced AD DS infrastructure management
Module 4: Implementing and administering AD DS sites and replication
Module 5: Implementing Group Policy
Module 6: Managing user settings with Group Policy
Module 7: Securing Active Directory Domain Services
Module 8: Deploying and managing AD CS
Module 9: Deploying and managing certificates
Module 10: Implementing and administering AD FS
Module 11: Implementing and administering AD RMS
Module 12: Implementing AD DS synchronization with Microsoft Azure AD
​
CEH 312-50:CERTIFIED ETHICAL HACKING (CEHV12)
3
Days
This 3 days Certified Ethical Hacker hands-on intensive training will is geared to give you the skills you need to level up your career and get a high-paying job! In Cyber Security & Penetration Testing Jobs.
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers.
CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today.
The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.
​
Module 1 : Introduction to Ethical Hacking
Module 2 : Foot Printing and Reconnaissance
Module 3 : Scanning Networks
Module 4 : Enumeration
Module 5 : Vulnerability Analysis
Module 6 : System Hacking
Module 7 : Malware Threats
Module 8 : Sniffing
Module 9: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injections
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking & OT Hacking
Module 19: Cloud Computing
​Module 20: Cryptography
​
CERTIFIED INFORMATION SECURITY MANAGER
3 Days
This 3-day Intensive hands-on training provides the fundamental networking skills required to deploy and support Windows Server 2016 in most organizations. It covers IP fundamentals, remote access technologies, and more advanced content including Software Defined Networking.
​
Module 1: Planning and implementing an IPv4 network
Module 2: Implementing DHCP
Module 3: Implementing IPv6
Module 4: Implementing DNS
Module 5: Implementing and managing IPAM
Module 6: Remote access in Windows Server 2016
Module 7: Implementing DirectAccess
Module 8: Implementing VPNs
Module 9: Implementing networking for branch offices
Module 10: Configuring advanced networking features
Module 11: Implementing Software Defined Networking
Cyber Security Non Certification
CYBER SECURITY ( GOVERNANCE RISK AND COMPLIANCE) PROFESSIONAL
This 2-day intensive training has been designed to provide with the knowledge and skills needed to support firms and organizations in Cyber Governance, Risk and Compliance Management.
​
MODULE
Module 1: Introduction
Module 2: Attacks and Modus Operandi
Module 3: Information Warfare, Cyber Espionage
Module 4: Defense
Module 5: The Future
2 DAYS
CYBER SECURiTY FOR management & boardroom
This 1 day workshop prepares members of the board, senior executives, and management to understand, assess, and take a proactive posture in cyber security.
With this training, you gain the fundamental knowledge and skills to investigate risk assessment and management frameworks that help mitigate dangers, as well as identify potential security gaps that could prove a liability.
​
MODULES
Module 1 : Introduction
Module 2 : Major Issues in Cyber Security
Module 3 : Cyber Security Risk Management Process
Module 4 : Guidance for Board Members and the C-Suite
​
1 DAY
CYBER HACKER : PENETRATION TESTING THE RIGHT WAY
This 3 days highly intensive training of CyberHacker : Penetration Testing The Right Way is built firmly upon proven, hands-on, Penetration Testing methodologies utilized by our Elite Group of Penetration Testing consultants.
This training also enhances your business skills needed to identify protection opportunities, justify testing activities and optimize security controls to reduce risk associated to working with the internet. The student will be using the latest tools, such as Saint, Metasploit through Kali Linux and Microsoft PowerShell.
​
MODULE
Module 1 : Information Gathering
Module 2 : Detecting Live System
Module 3 : Enumeration
Module 4 : Vulnerability Assessments
Module 5 : Malware Goes Undercover
Module 6 : Windows Hacking
Module 7 : Hacking UNIX/Linux
Module 8 : Pen Testing Wireless Networks
Module 9 : Networks, Sniffing, IDS
Module 10 : Injecting the Database
Module 11 : Attacking Web Technologies
Module 12 : Project Documentation
​
3 DAYS
Cyber Defence for Network Administrator
The Cyber Defence for Network Administrator “intensive hands-on” training focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.
Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. This intensive training will prepare Network administrators with the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyse the subject material.
In addition, network defence fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.
​
MODULE
Module 1: Network Security Threats, Vulnerabilities, and Attacks
Module 2: Network Security Controls, Protocols, and Devices
Module 3: Network Security Policy Design and Implementation
Module 4: Physical Security
Module 5: Host Security
Module 06: Secure Firewall Configuration and Management
Module 07: Secure IDS Configuration and Management
Module 08: Secure VPN Configuration and Management
Module 9: Wireless Network Defence
Module 10: Network Traffic Monitoring and Analysis
Module 11: Network Risk and Vulnerability Management
Module 12: Data Backup and Recovery
​Module 13: Network Incident Response and Management
2 DAYS
CYBER SAFE SEMINAR
Far too often, people end up being the weak point in an organization's overall cybersecurity plan. Protect your people and your organization.
Even with millions spent on security infrastructure, all it takes is one employee clicking on one wrong link to compromise critical data and information systems. End-user security awareness is a major issue in the business world today. The threat landscape is complicated, and the typical end-users are unaware of the ways in which they could adversely affect their organization.
With organizations being put under a microscope when it comes to their cybersecurity practices, the costs are too high to overlook the importance of effectively equipping end-users with the skills they need to combat the growing threat of cybercrime.
​
MODULE
Lesson 1 : Identifying the Need for Security
Lesson 2 : Securing Devices
Lesson 3 : Using the Internet Securely
​
1/2 DAY
Blue Team Level 1
The skills and tools you’ll learn in this course will be directly applicable to a range of security roles, and are actively used by defenders around the world.
​
Modules
Module 1 – Security Fundamentals
Module 2 – Phishing Analysis
Module 3 – Threat Intelligence
Module 4 – Digital Forensics
Module 5 – SIEM
Module 6 – Incident Response
​
​
​
​
2 DAYS
CYBERSECURITY for BEGINNER - SILVER EDITION
Data breaches. Ransomware. State-of-the-art attacks, advanced persistent threat (APT) targeting big organization and small businesses alike. Rarely a day goes by without another reminder in the headlines that improving security should be a top priority.
Of course, there's a big difference between knowing you should improve security and knowing how to get started.
​
Take your basic knowledge of cyber security to a whole new level with this exciting course that promises to be educational, informative and fun filled.
​
Module 1 : know Yourself - The Threat and Vulnerability Landscape
Module 2 : Know Your Enemy - The Current Threat and Vulnerability Landscape
Module 3 : Encryption Crash Course
Module 4 : Setting up a Testing Environment Using Virtual Machines (Lab)
Module 5 : Operating System Security & Privacy (Windows vs Mac OS X vs Linux)
Module 6 : Security Bugs and Vulnerabilities
Module 7 : Social Engineering and Social Media Offence and Defence
Module 8 : Security Through Isolation and Compartmentalization
2 DAYS
ENDUSER SECURITY AWARENESS TRAINING MANAGEMENT
Why Your Organization Needs Security Awareness Training
Your employees are not able to stay ahead of modern cyber threats on their own. Any company, from large to small, is susceptible to being hacked and exploited. The damage is pretty much always severe.
​
MODULE
Module 1 : What Is Cybersecurity?
Module 2 : What is Social Engineering?
Module 3 : Emails and Links
Module 4 : Basics of Online Security
1 DAY
HACKING HANDS ON LAB -
ETHICAL HACKING & PENETRATION TESTING MEGA TRAINING
Network and IT security is no joke. In a matter of minutes cyber criminals can access protected networks, view encrypted files, accounts, and even steal identities. This 3 days Mega Intensive Training is designed to introduce these concepts and the real-world tactics that hackers use, so that you can protect yourself and your network.
This training is ideal for everyone, regardless of their skills and expertise. The arrangement and presentation of learning resources will let both novices and more advanced students broaden their knowledge of IT security, ethical hacking and penetration testing.
​
MODULE
Module 1 : Real-World Ethical Hacking: Hacking Windows OS!
Module 2 : Create Your Own Virtual Hacking Lab! A.K.A CyberRange Lab
Module 3 : Linux Terminal and Windows PowerShell Commands
Module 4 : Create a Virtual Network for Ethical Hacking!
Module 5 : Social Engineering: Capturing Usernames and Passwords via Phishing
Module 6 : Recon: Information Gathering, Scanning and Enumeration
Module 7 : Remote Hacking Windows Server 2019 & Windows 10 : Attack Phase
Module 8 : Hacking Windows Server & Windows 10: Command & Control Phase
Module 9 : Password Problems - Cracking, Snacking & Hijacking
Module 10 : Web Hacking - Testing and Securing Web Applications
Module 11 : Mobile Hacking on Android
2 DAYS
HACKING & CRACKING WITH KALI LINUX
In this 2 days intensive training, we’re going through the Hacking & Cracking Lifecycle using the most advanced live disk available today, Kali Linux 2020.
After brief introduction, students will learn the details on how to find, download, install, and customize Kali Linux.
Trainer will guide students on basic Linux configurations and settings to ensure basic commands and settings are understood.
Once all the basic covered, the rest of the module devoted to the penetration testing lifecycle, Reconnaissance, Scanning, Exploitation, Maintaining Access, and Reporting.
The reporting phase will detail reports that can be used to present findings to management and leadership and a Rules of Engagement (ROE) template that can be used before beginning a penetration test.
​
MODULE
Module 1 : Getting Comfortable with Kali Linux
Module 2 : The Essential Tools
Module 3 : Passive Information Gathering
Module 4 : Active Information Gathering
Module 5 : Vulnerability Scanning
Module 6 : Win32 Buffer Overflow Exploitation
Module 7. - Working with Exploits
Module 8. – File Transfers
Module 9. – Privilege Escalation
Module 10 : Client Side Attacks
Module 11. – Web Application Attacks
Module 12 : Password Attacks
Module 13 : The Metasploit Framework
Module 14 : Bypassing Antivirus Software
​
2 DAYS
ETHICAL HACKING & PENTEST FOR IT ADMINISTRATOR
This intensive 3 days Technical Session aimed at people who are new to the world of hacking and penetration testing, for those with little or no previous experience, for those who are frustrated by the inability to see the big picture (how the various tools and phases fit together), for a person who wants to quickly get up-to-speed on with the seminal tools and methods for penetration testing, or for anyone looking to expand their knowledge of offensive security.
​
Module 1 : What is Penetration Testing?
Module 2 : Reconnaissance
Module 3 : Scanning
Module 4 : Exploitation
Module 5 : Social Engineering
Module 6 : Web-Based Exploitation
Module 7 : Post Exploitation and Maintaining Access with Backdoors, Rootkits, and Meterpreter
Module 8 : Wrapping Up the Penetration
2 DAY
HACKING & PENTEST WITH KALI LINUX
In this 2 days Highly Intensive Training, we’re going through the Penetration Testing Lifecycle using the most advanced live disk available today, Kali Linux 2020.
After brief introduction, students will learn the details on how to find, download, install, and customize Kali Linux.
Trainer will guide students on basic Linux configurations and settings to ensure basic commands and settings are understood.
Once all the basic covered, the rest of the module devoted to the penetration testing lifecycle, Reconnaissance, Scanning, Exploitation, Maintaining Access, and Reporting.
The reporting phase will detail reports that can be used to present findings to management and leadership and a Rules of Engagement (ROE) template that can be used before beginning a penetration test.
​
MODULE
Module 1 : Installing and Configuring Kali Linux
Module 2 : Pre-penetration Testing Checklist
Module 3 : Information Gathering
Module 4 : External Pen-testing
Module 5 : Website Penetration Testing
Module 6 : Internal Network Penetration Testing
Module 7 : Network Sniffing
Module 8 : Exploitation
Module 9 : Social Engineering
Module 10 : Wi-Fi Penetration Testing
Module 11 : Brute Force Attack Testing
Module 12 : Advanced Penetration Testing
​
2 DAYS
INCIDENT HANDLING PRACTITIONER
The Certified Incident Handling Practitioner vendor neutral training is designed to help Incident Handlers, System Administrators, and any General Security Engineers understand how to plan, create and utilize their systems in order to prevent, detect and respond to attacks.
In this in-depth training, students will learn step-by-step approaches used by hackers globally, the latest attack vectors and how to safeguard against them, Incident Handling procedures (including developing the process from start to finish and establishing your Incident Handling team), strategies for each type of attack, recovering from attacks and much more.
​
MODULE
Module 1 - Incident Handling Explained
Module 2 - Threats, Vulnerabilities and Exploits
Module 3 – Preparation
Module 4 - First Response
Module 5 – Containment
Module 6 – Eradication
Module 7 – Recovery
Module 8 – Advanced - Computer Security Incident Response Team
Module 10 – Advanced - Log File Analysis
Module 11 – Advanced - Malware, Rootkits and Botnets
Module 12 – Advanced - Artifact Analysis
​
​
2 DAYS
IoT SECURITY - HACKING WITH RASpBERRY PI4
This 2 days intensive training is focused on the practical side of IoT Ethical Hacking with Raspberry Pi4 without neglecting the theory behind each attack.
Before jumping into the hacking, you will first learn how to set up Ethical hacking lab and install needed software into Raspberry Pi4 to practice ethical hacking on your own machine.
Once you understand how Raspberry Pi4 are working, we will discuss about how these can be exploited by hackers and what we can do to protect them.
This training will take you from a beginner to a more advanced level - by the time you will complete the training, you will be able to identify the hacking attacks against your network and take the necessary steps to protect it.
​
MODULE :
Module 1 : A look at the Raspberry Pi 4 and Kali Linux 2020
Module 2 : Step by Step - Combining a Raspberry Pi with Kali Linux
Module 3 : Powering up the Raspberry Pi 4
Module 4 : A look at Kali Linux 2020 most popular Penetration Tools (Wireless Tech)
​Module 5 : Advanced Tweaks and Recommended Settings
​
​
2 DAYS
IoT security
The ability to connect, communicate with, and remotely manage an incalculable number of networked, automated devices (approximately 26 Billion by 2020) via the Internet is becoming pervasive, from the factory floor to the hospital operating room to the residential basement.
The transition from closed networks to enterprise IT networks to the public Internet is accelerating at an alarming pace—and justly raising alarms about security. As we become increasingly reliant on intelligent, interconnected devices in every aspect of our lives, how do we protect potentially billions of them from intrusions and interference that could compromise personal privacy or threaten public safety?
This training covers the basics of IoT landscape and takes you thru on the Security Challenges and vulnerabilities and teaches you the steps to hack and harden the IoT devices, applications and ecosystem.
​
MODULE
Module 1 : IoT an Overview
Module 2 : IoT Security
Module 3 : OWASP Top 10 IoT Vulnerabilities
Module 4 : Hacking IoT Devices – Case Studies
2 DAYS
NETWORK PENETRATION TESTING & ETHICAL HAcKING
As the amount of cyber threats continue to grow, so does the Cyber Security industry. The need for capable Ethical Hackers is a global need. Ethical Hackers are “white-hat” hackers (aka the good guys) that penetrate secured systems to highlight flaws and weaknesses in a system.
They help government agencies, private businesses and public organizations identify what is secure and what needs to be fixed. If the idea of hacking as a career excites you, you’ll benefit greatly from this Network Penetration Testing and Ethical Hacking training.
You’ll learn how to exploit networks in the manner of an attacker, in order to find out how protect the system from them. Learning objectives include Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
At the conclusion of this training class, you’ll be able to create an effective vulnerability prevention strategy to prevent the attackers from entering your system.
MODULE
Module 1 - Ethical Hacking & Penetration Testing
Module 2 - Methodology Overview
Module 3 - Reconnaissance (Footprinting)
Module 4 - Scanning
Module 5 - Port & Service Enumeration
Module 6 - Data Enumeration
Module 7 - Vulnerability Assessment
Module 8 - Penetration/Access/Compromise
Module 9 - Evading Defenses & Erasing Tracks
Module 10 - Hacking Techniques
​
2 DAYS
Security Operations Centre (SOC) Analyst Foundation
Security operations training to help you respond to security incidents and vulnerabilities. Improve your operational security capability, leverage the security operations centre (SOC) analyst and specialist training techniques used in vulnerability management and security information event management (SIEM) platforms.
Understanding the techniques provides a foundation for assessing and managing cyber risk through effective security incident triage.
This training provides security operations analysts the foundation training needed to address the cyber threat lifecycle, looking at common and advanced attack vectors, detection, reporting and collaboration and simulated attack.
​
MODULE :
Module 1 : Security Management
Module 2 : Incident Response & Continuity Management
Module 3 : Security Education
Module 4 : Security Information Event Management
​Module 5 : Vulnerability Management
Module 6 : Threat Detection
Module 7 : Security Assessments
Module 8 : Simulated Attack - Defend - Attack
​
2 DAYS
Network Defense Professional (NDP)
The NDP 2 Days Hands-On intensive training starts with basic security concepts and continues to the advanced level of network security.
This training will help you design secure networks, how to securely configure network devices such as routers and switches, as well as firewall configuration for websites and networks and virus protection.
In the final part of this training, you will learn how to provide security in the Windows operating system. You will also learn in depth important Windows services such as Active Directory, Group Policy, security path management, and vulnerability management.
​
MODULE
Module 1 : Introduction to Network Defense
Module 2 : Network Security
Module 3 : Endpoint Security
2 DAYS
Cyber Security - Attack & Countermeasures Strategist (CSACS)
The Cyber Security - Attack & Countermeasures Strategist (CSACS), enables participants to understand the importance of Cyber Security, Network Security and latest Cyber Attack by providing industry knowledge and skills. In doing so, the Cyber Security - Attack & Countermeasures Strategist (CSACS) participants is able to understand how latest Cyber Attack been discovered using some very vast techniques. In addition, the Cyber Security - Attack & Countermeasures Strategist (CSACS) training helps participants learn how to implement counter response and preventative measures when it comes to a Cyber Hacking.
The Cyber Security - Attack & Countermeasures Strategist (CSACS) training provides in-depth Virtualization & Cloud labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real world hacking scenarios and equip the participants to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.
MODULE
Module 1 - Cyber Security Fundamentals
Module 2 - Building your “Hacking Lab”
Module 3 - Get Familiar with Kali Linux “The Attacker”
Module 4 - Hiding your Identity - Escape route
Module 5 - Footprinting and Reconnaissance (Information Gathering)
Module 6 - Network Scanning
Module 7 - Enumeration
Module 8 - Password Cracking
Module 9 - Malware Threat & Countermeasures
Module 10 - Sniff your Victim
Module 11 : Social Engineering Attack
Module 12 : Hacking WEB Server
Module 13 : SQL Injection
Module 14 : WiFi (Wireless) Cracking
​Module 15 : Evading IDS, Firewalls and Honeypots
​
2 DAYS
Cyber Security :Hacker Exposed
The Cyber Security : Hacker Exposed training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the Cyber Security : Hacker Exposed student is able to understand how malware and destructive viruses function. In addition, the Cyber Security : Hacker Exposed course helps students learn how to implement counter response and preventative measures when it comes to a network hack.
The Cyber Security : Hacker Exposed training provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands-on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.
.
​
MODULE :
Module 1 : Security Fundamentals
Module 2 : Access Controls
Module 3 : Protocols
Module 4 : Cryptography
Module 5 : Why Vulnerability Assessments?
Module 6 : Vulnerability Tools of the Trade
Module 7 : Output Analysis and Reports
Module 8 : Reconnaissance, Enumeration & Scanning
Module 9 : Gaining Access
Module 10 : Maintaining Access
Module 11 : Covering Tracks
Module 12 : Malware
Module 13 : Buffer Overflows
Module 14 : Password Cracking
​
2 DAYS
Technical Security Audit and Assessment
This intensive 2 days workshop is ideal for anyone whose job requires them to understand the security of their systems and networks, including IT security analysts, consultants, engineers, and managers, IT system and network administrators, and IT program managers. Regardless of your role, if you have an upcoming security audit and you want to make sure you're ready, this is a great training for you.
Some of the information cover in this workshop will be highly technical, so you'll want to have at least a basic understanding of system and network security.
You should know fundamental networking concepts, such as how TCP/IP networks, IP addressing, and subnetting work, as well as the purpose and functions of network devices like switches, routers, and firewalls.
​
MODULE
Module 1 : Overview of Technical Security Assessments
Module 2 : Overview of Technical Security Assessments
Module 3 : Identify and Analyze Targets
Module 4 : Validate Target Vulnerabilities
Module 5 : Planning Technical Security Assessments
​Module 6 : Executing the Technical Security Assessment
2 DAYS
Web PenTest & Network Defense
​
MODULE
Module 1 - Introduction to Penetration Testing & Setup
Module 2 - Reconnaissance
Module 3 - Server-side-Attacks
Module 4 - Client Side Attacks
Module 5 - Attacking Authentication
Module 6 - Web Attacks
Module 7 - Web Application Firewalls & IDS
Module 8 - Defensive Countermeasures
Module 9 - Penetration Testing & Reporting
​
​
2 DAYS
Network Security
The Network Security “intensive hands-on” training focuses on creating Network Administrators who are trained on protecting, detecting and responding to the threats on the network.
Network administrators are usually familiar with network components, traffic, performance and utilization, network topology, location of each system, security policy, etc. This intensive training will prepare Network administrators with the fundamental understanding of the true construct of data transfer, network technologies, software technologies so that the they understand how networks operate, understand what software is automating and how to analyse the subject material.
In addition, network defence fundamentals, the application of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration, intricacies of network traffic signature, analysis and vulnerability scanning are also covered which will help the Network Administrator design greater network security policies and successful incident response plans.
​
MODULE :
Module 01: Network Security Threats, Vulnerabilities, and Attacks
Module 02: Network Security Controls, Protocols, and Devices
Module 03: Network Security Policy Design and Implementation
Module 04: Physical Security
Module 5: Host Security
Module 06: Secure Firewall Configuration and Management
Module 07: Secure IDS Configuration and Management
Module 08: Secure VPN Configuration and Management
Module 9: Wireless Network Defence
Module 10: Network Traffic Monitoring and Analysis
Module 11: Network Risk and Vulnerability Management
Module 12: Data Backup and Recovery
Module 13: Network Incident Response and Management
​
2 DAYS