Call Us:

Cyber Security Training: Testing and Management (Best Practices)

When:
April 20, 2020 – April 25, 2020 all-day
2020-04-20T00:00:00+03:00
2020-04-26T00:00:00+03:00
Cost:
Free

CYBER SECURITY TRAINING

Testing and Management (Best Practices)

Course Outline

Day Topics to be covered Training Level Ratio             

Theory

 

Practical

 

One

 

Introduction to Ethical Hacking, Hacker Types and Ethics, Hacking Vocabulary, Attack Types and Vector, 5 Phases of Hacking, Foot Printing and Reconnaissance, Google Hacking, Website Reconnaissance, Metagoofil Metadata, Email Recon Footprint, whois, nslookup tool for Recon, Scanning Network, Port Discovery, Stealth Idle Scan

 

 

Testing

 

20%

 

 

80%

 

 

Two

 

OS & Application Fingerprint, Vulnerability Scanning, Windows Vulnerability, Network Mapping Tool, Proxy Server, Public Proxy Server, Enumeration Concept, NetBIOS Enumeration, SNMP Enumeration, LDAP Enumeration, SMTP Enumeration, System Hacking Overview, Windows Password Break, Password Cracking Overview, Password Cracking Telnet/HTTP/FTP

 

 

Testing

 

20%

 

 

80%

 

 

Three

 

Rainbow Crack Lab Setup, Rainbow Crack Demonstration, Password Reset Hacking, DHCP Starvation Attack, Spyware, NTFS Alt Data Streams Exploits, Steganography with Open puff, Steganography with snow, Covering track after hack, DHCP Snooping, Dynamic ARP Inspection, Social Engineering

 

 

Testing

 

20%

 

 

80%

 

 

Four

 

Denial of Service Attack, Session Hijack, Hack Web Server, Buffer Overflow Attack, Shell Shock Attack, OWASP Broken Web Application Project, SQL Injection, Web App Vulnerabilities Word press, , Malware for Mobile, Mobile Device Risk and Best practices, Firewall Evasion, Firewall ACL Example, NAT and PAT Fundamentals, IDS IPS Evasion, Honeypot, Cloud Computing, Wireless Hacking

 

 

Management

 

50%

 

 

50%

 

 

Five

 

CIA, Policies, Quantifying Risk, Separation of Duties, Symmetrical Encryption Concept, Asymmetrical Encryption Concepts, Control Types, Multifactor Authentication, Centralized identity Management, Kerberos and Single sign on, Backup and Media Management, Operation Security Control, Physical Security Controls, Incident Response, VPNs, Disaster Recovery Planning, Pen Testing Tips,  Introduction of IOT

 

 

Management

 

90%

 

 

10%

 

Six Tour: Nairobi National Park and City Tour

 

 

Leave a Reply


Address

The e-Enhancement Centre
Westlands Commercial Centre
Nairobi - Kenya

Find Us on Facebook