CYBER SECURITY
Wireless Threats and defenSes essentials
5 days training event
6100-3084
What will you learn?
Start a career in cyber security. Become a cyber security specialist.
Understand the basic concepts and terminologies used in the information and cyber security fields.
An advanced practical skill set in defeating all online threats - advanced hackers, trackers, malware and all Internet nastiness.
The very latest up-to-date information and methods.
Explore the threat landscape - Darknets, dark markets, zero-day vulnerabilities, exploit kits, malware, phishing and much more.
Go in-depth into security through physical and virtual isolation and compartmentalization. Covering sandboxes, application isolation.
You will master encryption in an easy-to-follow crash course
You will learn about nation-state secret tracking and hacking infrastructure.
Pre-Requisites
A basic understanding of using operating systems, networks, and the Internet. Be able to download and install the software. A willingness to learn.
Course Outlines - 5 Days
Introduction
Welcome and introduction to the instructor
Goals and Learning Objectives
Difference between Information Security and Cyber Security
Basic Terminologies
Computer Protocols
TCP/IP
Hackers and Crackers
The Top 3 Things To Stay Safe Online
Security Bugs and Vulnerabilities - The Vulnerability Landscape
What is NOT Hacking
Types of Hackers
The Hacking Methodology
The WhoIS Query
Social Engineering
Attacks
Brute Force Attacks
Phishing, Vishing, and SMShing
Spamming & Doxing
Bots and Botnets
DoS and DDoS
Pings
Man in the Middle Attacks
SQL Injections
Malware
Viruses & Worms
Trojans
Adware and Spyware
Ransomeware
Browser Hijacking
Other Types of Malware
Encryption Crash Course
Symmetric Encryption
Asymmetric Encryption
Hash Functions
Digital Signatures
Secure Sockets Layer SSL and Transport Layer Security TLS
SSL Stripping
HTTPS (HTTP Secure)
Digital Certificates
Certificate Authorities and HTTPS
End-to-End Encryption (E2EE)
Steganography
How Security and Encryption is Really Attacked
Defenses
Firewalls
Encryption
Biometrics
Anti Virus
Factor Authentication Methods
Honey Pots and DMZs
Security for Wireless Networks
Password Management
Cyber Security at the Work Place
Cyber Security Policies
BYOD Management
A Sample BYOD Policy
The Security vs Ease of Access Paradox
Social Engineering and Social Media Offence and Defence
What is Social Engineering?
Reconnaissance Methods
The Way Back Machine
Information Disclosure and Identity Strategies for Social Media
Identify Verification and Registration
Security Domains
What is Social Engineering?
Reconnaissance Methods
Security Through Isolation and Compartmentalization
Introduction to Isolation and Compartmentalization
Physical and Hardware Isolation - How to change the Mac Address
Physical and Hardware Isolation - Hardware Serials
Virtual Isolation
Dual Boot
Built-in Sandboxes and Application Isolation
Windows - Sandboxes and Application Isolation
Windows - Sandboxes and Application Isolation - Sandboxie
Linux - Sandboxes and Application Isolation
Mac - Sandboxes and Application Isolation
Virtual Machines
Virtual Machine Weaknesses
Virtual Machine Hardening
Whonix OS - Anonymous Operating system
Whonix OS - Weaknesses
Qubes OS
Security Domains, Isolation and Compartmentalization
TRAINING LOCATIONS
أماكن ومقرات التدريب حول العالم
Dubai
Kuala Lumpur
Tunis
Istanbul
Amman
Sharm El Sheikh
Ottawa
Paris