One Week
Workshop on ‘CYBER SECURITY’
DETAIL
CONTENTS
1. Cyber
Security Concepts (2 Hours)
Essential
Terminologies: CIA, Risks, Breaches, Threats, Attacks, Exploits. Information
Gathering (Social Engineering, Foot Printing & Scanning).
Open
Source/ Free/ Trial Tools: nmap, zenmap, Port Scanners, Network scanners.
2.
Cryptography and Cryptanalysis (4 Hours)
Introduction
to Cryptography, Symmetric key Cryptography, Asymmetric key Cryptography,
Message Authentication, Digital Signatures, Applications of Cryptography.
Overview of Firewalls- Types of Firewalls, User Management, VPN Security,
Security Protocols: - security at the Application Layer- PGP and S/MIME,
Security at Transport Layer- SSL and TLS, Security at Network Layer-IPSec.
Open Source/
Free/ Trial Tools: Implementation of Cryptographic techniques, OpenSSL, Hash
Values Calculations MD5, SHA1, SHA256, SHA 512, Steganography (Stools)
3.
Infrastructure and Network Security (6 Hours)
Introduction
to System Security, Server Security, OS Security, Physical Security,
Introduction to Networks, Network packet Sniffing, Network Design Simulation.
DOS/ DDOS attacks. Asset Management and Audits, Vulnerabilities and Attacks.
Intrusion detection and Prevention Techniques, Host based Intrusion prevention
Systems, Security Information Management, Network Session Analysis, System
Integrity Validation.
Open
Source/ Free/ Trial Tools: DOS Attacks, DDOS attacks, Wireshark, Cain &
abel, iptables/ Windows Firewall, snort, suricata, fail2ban
4. Cyber
Security Vulnerabilities& Safe Guards (8 Hours)
Internet
Security, Cloud Computing &Security, Social Network sites security, Cyber
Security Vulnerabilities-Overview, vulnerabilities in software, System
administration, Complex Network Architectures, Open Access to Organizational
Data, Weak Authentication, Authorization, Unprotected Broadband communications, Poor Cyber Security
Awareness. Cyber Security Safeguards- Overview, Access control, IT Audit,
Authentication. Open Web Application Security Project (OWASP), Web Site Audit
and Vulnerabilities assessment.
Open
Source/ Free/ Trial Tools: WinAudit, Zap proxy (OWASP), burp suite, DVWA kit.
5.
Malware (8 Hours)
Explanation
of Malware, Types of Malware: Virus, Worms, Trojans, Rootkits, Robots,
Adware’s, Spywares, Ransom wares, Zombies etc., OS Hardening (Process
Management, Memory Management, Task Management, Windows Registry/ services
another configuration), Malware Analysis.
Open
Source/ Free/ Trial Tools: Antivirus Protection, Anti Spywares, System tuning
tools, Anti Phishing.
6.
Security in Evolving Technology (8 Hours)
Biometrics,
Mobile Computing and Hardening on android and ios, IOT Security, Web server
configuration and Security. Introduction, Basic security for HTTP Applications
and Services, Basic Security for Web Services like SOAP, REST etc., Identity
Management and Web Services, Authorization Patterns, Security Considerations,
Challenges.
Open
Source/ Free/ Trial Tools: adb for android, xcode for ios, Implementation of
REST/ SOAP web services and Security implementations.
7. Cyber
Laws and Forensics (9 Hours)
Introduction,
Cyber Security Regulations, Roles of International Law, the state and Private
Sector in Cyberspace, Cyber Security Standards. The INDIAN Cyberspace, National
Cyber Security Policy 2013. Introduction to Cyber Forensics, Need of Cyber
Forensics, Cyber Evidence, Documentation and Management of Crime Sense, Image
Capturing and its importance, Partial Volume Image, Web Attack Investigations,
Denial of Service Investigations, Internet Crime Investigations, Internet
Forensics, Steps for Investigating Internet Crime, Email Crime Investigations.
Open
Source/ Free/ Trial Tools: Case Studies related to Cyber Law, Common Forensic
Tools like dd, md5sum, sha1sum, Ram dump analysis, USB device
Cyber Security Training Institute in Gurgaon
ReplyDelete