Cyber Attack and Defense in Practice
without VAT
No terms available at the moment
Price without VAT 1 450,00 €
Goals
After completion of the course, students will be able to:
- Perform basic security test
- Detect most common web application vulnerabilities
- Perform social engineering penetration test
- Analyze e-mail headers
- Analyze suspicious files
- Analyze network traffic from the security standpoint
- Detect network attacks
- Detect malicious files on endpoints.
Target audience:
- Networking specialists
- CSIRT analysts
- SOC operators
- IT administrators
- Other IT specialists with interest in security.
Duration
2 days (8h/day)
Requirements
- User-level Linux knowledge
- Advanced Windows knowledge
- Experience with programming/scripting
- Elementary knowledge of HTML
- Foundation-level understanding of some of the common concepts for network environments, such as routing and switching.
- Foundational knowledge of major TCP/IP networking protocols, including, but not limited to, TCP, IP, UDP, DNS, HTTP, ARP, ICMP, and DHCP.
- Foundation-level understanding of some of the common cyber security concepts, such as firewall and IPS.
Contents
Course is taught using the Alef Cyber Security Polygon - virtual environment containing a set of small corporate networks, simulating the infrastructure, systems and employees of real organizations. These networks offer similar possibilities for attackers and defenders, as they would have when testing or protecting real corporate infrastructure. During the training, attendees will first take on the roles of (un)ethical hackers. In this phase of the course, trainees will learnget to know basics of security testing and will have a chance to try attacking networks, web applications and even end users (scripts which simulate user actions and reactions are part of the Polygon subsystem). In second part of the course, trainees will be tasked with the responsibilities of security specialits who defend corporate networks. They will learn to detect malicious network traffic with the help of their own IPS signatures, detect malware on endpoints or analyze suspicious e-mails and their attachments.
Cyber attack
- Methodologies and proceses of penetration tests
- Footprinting and OSING
- Scanning and enumeration
- Techniques and tools for network intrusion
- Basic web application attacks
Cyber defense
- E-mail header analysis and identification of spoofed messages
- Analysis of scripts and other executables, office documents and PDFs using specialized tools
- Security analysis of PCAP files
- Creation of Snort signatures and their use
- Creation of YARA rules and their use
Literature
Participants will be provided with printed copy of course materials.
Thank you for your interest.
We will do our best to answer and arrange a term.
Thank you for your interest.
We will answer your request or comment as soon as possible.
Thank you for your interest.
We will do our best to answer and arrange a term.
Training rooms
ALEF operates with training rooms match submarine's style to unexpected, unusual while still being smart and available to work in. We have several type of rooms for small groups and up to larger rooms with modern technical equipment and supportive technologies we provide.
We also deliver the high-quality multimedia sharing for efficient, effective virtual communication on a global scale. In the Competence Center is also available Spark Board. Cisco Sparkboard integrates the most common tools needed for team collaboration in physical meeting rooms into a single elegant device. It also combines white board, video or audio conference features.
All ALEF training centres operates with testing centre that provides full acess to take an exam and get certificate provided by our vendors. ALEF provides to our customer complete management and administration.
Team of lecturers
Our team - consisting of more than 50 instructors - offers a full range of technological knowledge in the field of routing, switching, security, collaboration and data centers. The expertise of instructors is evidenced by a range of top-level international certifications.
The uniqueness of our lecturers lies mainly in their extensive experience in connection with each project, allowing them to respond very flexibly to any question or suggestion from students, and to pass on their practical knowledge to the participants of these courses. Thanks to the synergy of the company’s reliable operation and many years of experience, we have been very flexible in responding to the changes prepared in the Cisco field, so we can guarantee you a wide range of certified courses that enable you and your colleagues to acquire the necessary know-how for future certification tests.
In addition to the certified trainings, we offer special courses that are focused primarily on the development of the necessary configuration skills.
OUR KNOWLEDGE IS YOUR FUTURE