Course Details

Your Growth, Our Mission

CYBERSECURITY FOUNDATIONS
Course Description
When you consider just a few of the consequences of a security breach - your proprietary information completely accessible, hefty fines for security lapses, news headlines about your company's security breach, it becomes obvious: An in-depth and thorough understanding of cyber security fundamentals and best practices is absolutely necessary. In this cybersecurity course, you will gain a global perspective of the challenges of designing a secure system, touching on all the cyber roles needed to provide a cohesive security solution. Through lecture, labs, and breakout discussion groups, you will learn about current threat trends across the Internet and their impact on organizational security. You will review standard cybersecurity terminology and compliance requirements, examine sample exploits, and gain hands-on experience mitigating controls. In a contained lab environment, you will work with live viruses, including botnets, worms, and Trojans. In addition to technical cybersecurity components, you will learn and explore the non-technical aspects of cybersecurity necessary to mitigate risk and lessen exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This course provides an excellent foundation for those proceeding to CISSP, CEH, CISA, or CISM training.
  1. Current cyber threats and cybersecurity site references
  1. Government-mandated directives and compliance requirements
  2. Cyber roles required to successfully design secure systems
  3. The attack cycle perpetrated by malicious hackers
  4. Enterprise policy requirements
  5. Best strategies for securing the enterprise with layered defenses
  6. How security zones and detailed logging augment information assurance
  7. Forensic challenges and incident response planning
  8. Risk management process
  9. Goals achievable with auditing, scanning, and testing systems
  10. Industry recommendations for maintaining secure access control
  11. Standards-based cryptographic solutions for securing communications

Cybersecurity professionals, including security analysts, intel analysts, policy analysts, security operations personnel, network administrators, system integrators, VARS, and security consultants

The Cyber Battlefield

Critical Business Security

Worldwide Internet Growth

Security Fundamentals

Security Goals

Terminology Threats and Exposures

Exploits and Exposures

Hackers and Crackers

Attack Methods

Social Engineering

Common Attack Vectors

Traffic Analysis

Responding to Threats and Attacks

Documents and Procedures to Manage Risk

Vulnerability Scanners

Penetration Testing

The OSSTMM

NIST

Risks of Penetration Testing

 

  1. The Structure of the Internet and TCP/IP

CNCI

Initiatives

Legal Compliance Standards

Acts

Federal Agency Compliance

Commercial Regulatory Compliance

Internet Leadership IANA

Regional Internet Registry

Protocols and RFCs

TCP/IP Model

Network Access Layer

Internet Layer

Host-to-Host Layer

Process Layer

Domain Name Service

 

  1. Vulnerability Assessment and Tools

Vulnerabilities and Exploits

Vulnerability Assessment Tools

Application-Level Scanners

System-Level Scanners

System-Level Testing Tools

Open Source System-Level Scanner Tools

Commercial System-Level Scanner Tools

Advanced Attack Techniques and Tools

Commercial Exploit Tools

Free Exploit Tool: Meta sploit

Free Exploit Tool: BeEF

Fuzz Testing

Preventing Exploits and Attacks

Patch Management

Common Vulnerabilities and Exposures

Alerts and Software

Tools

Vulnerability Research

Common Security Sites

Patch Management

Tools

 

  1. Cyber Awareness

Social Engineering

Social Engineering Goals

What Makes Social Engineering Possible

Targets

Attacks

Phishing

Phishing via Email

Online Attacks

Statistical Data

Sources of Security Breaches

Preventing Social Engineering

Cyber Awareness: Policies and Procedures

Security Policy Topics

Social Media

Social Networking Sites

 

  1. Cyber Attacks: Foot, printing and scanning

Foot printing

Gathering Information

Unearthing Initial Information

Internet Archive

People Search

Locations and Mapping

Job Boards

Financial Information

Google and Search Operators

Identifying the Target Network and Its Range

WHOIS Utility

DNS Online Search Tools

Traceroute

Foot printing Countermeasures

Detecting Live Systems

Bypassing Authentication

War Dialing

War driving

ICMP: Ping

Port Scanning

Performing TCP and UDP Scans

Port Numbers

TCP Flags

TCP Three Way Handshake

Port Scanning Techniques

TCP Full Connect Port Scan

TCP Half Open (SYN) Scanning

N map Half Open Scan

UDP Port Scan

N map Scan Types and Switches

Port Scanning Tools

OS Fingerprinting

Active Stack Fingerprinting

Passive Fingerprinting

Proxies and Anonymizers

Scanning Countermeasures

 

  1. Cyber Attacks: Breaking and Entering

Password Attacks

Privilege Escalation

Maintaining Access

Windows Authentication

Sys Key Encryption
LAN Manager Password Encryption

Windows LAN Manager and NTLM Hashes

Linux Password Encryption

SAM Database Insecurities

Password Extraction Cracking

Password Cracking Techniques

Password Cracking Tools

LCP

John the Ripper

Cain and Abel

Password Cracking Countermeasures

Covering Tracks

Principle of Exchange

Clearing the Logs

Hiding Tools, Files, and Programs

NTFS Alternate Data Streaming

Information Hiding: Methods

Steganography

Steganography Detection

Rootkits

Countermeasures: Rootkits

 

  1. Cyber Attacks: Backdoors and Trojans

Malware

Trojans

Trojan Infection Mechanisms

Well-Known Trojans

Distribution Methods Wrappers

Trojan Auto start Methods

Covert Communications

Stealth Technique: Avoiding Detection

Backdoor Countermeasures

Malware Countermeasure

Anti-Spyware Software

Malware Countermeasure Practices

 

  1. Cyber Assessment and Risk Management

Risk Management Steps

Determining ALE

CRAMM Process

Risk Management Lifecycle

Protected Assets

CIA Triad

Quantitative Risk Assessment

Threat Determination Process

Risk Assessment

Lifecycle

Steps

Vulnerability Categories

Business Assets vs. Risk

Benefits of Risk Management

Policy

Assessment

 

  1. Security Policy Management

Security Policy

Use

Importance

Legal Issues

Example

Policy References

Policies, Guides, Standards, Procedures, and Controls

Security Policy Coverage Matrix

Example: Internet Security Coverage Matrix

Granular View of a Security Matrix

Basic Policies

 

  1. Securing Hosts and Servers

Types of Hosts

General Configuration Guidelines

Clean Systems

Unnecessary Services

Warning Banners

Limiting Access

Configuring and Logging

Security Patches

Security Baselines

Traffic Filtering Monitoring

DoS Vulnerabilities

Server Hardening

Web Server Hardening

Mail Server Hardening

FTP Server Hardening

DNS Server Hardening

Other Servers

Workstation Considerations

Network Appliances

Wireless Access Hardening

VLAN Security

Software Attacks

 

  1. Securing Communications

Applying Cryptography to OSI Model

Tunnels

Securing Services

Email

FTP and Telnet

SSL and TLS

Gateway-to-Gateway VPN

Host-to-Gateway VPN

IP Security

Wireless Access Communication

Wireless Security

 

  1. Authentication and Cryptographic Solutions

Authentication

Authentication Issues

Cryptosystems Password Authentication

Hash Functions

Kerberos Cryptographic Benefits

Symmetric Key Encryption Asymmetric Encryption Digital Signatures PKI Components

Models

Policies

Lifecycle

Distribution

 

  1. Firewalls and Edge Devices

General Security Integration

Services

Needs for Services

Security Zones

Filtering

Screened Subnets

Trusted Zones

Devices

Routers

Firewalls

DMZ Hosts

Other Security Considerations

Business-to-Business Communications

Exceptions to Policy

Special Services and Protocols

Configuration Management

Software Development Security

Certification and Accreditation

Common Criteria

Intrusion Detection and Prevention

Defense in Depth

Network Device Logging

Host Monitoring and Logging

Events Correlation

Placement of IDS Monitors and Sensors

Monitoring

Host-Based and Network-Based Differences

Policy Management

Behavioral Signatures

IDS and IPS Weaknesses

Encryption

Incorrect Configuration


  1. Forensic Analysis

Incident Handling

Security Incident Response

Time and Reaction Sensitivity

Incident Handling Issues and Considerations

Response Procedures

Evidence

Logging

Log Analysis Tools

Active Ports

Dependency Walker

Log Maintenance

  1. Disaster Recovery and Business Continuity

Disaster Types

Disaster Recovery Plan (DRP)

DRP Goals

Creating a DRP

DRP Contents

DRP Design Requirements

DRP Priorities

Recovery Strategies

High Availability

Data Collection Documentation

DRP Testing

Business Continuity Planning

BCP Steps

  1. Cyber Evolution

Cyber Forces

Cyber Terrorism

Cyber Security: Crime, War, or Fear Mongering?

Cyber Future 7 Compliance Initiatives

Cyber Defense in Depth

Education and Training

 

Request Info

Course Rounds

5 Days
Code Date Venue Fees Action

Prices don't include VAT

Related Courses

Your Growth, Our Mission

Contact Us

Contact us to meet all your inquiries and needs, as our professional team is pleased to provide immediate support and advice to ensure you achieve your goals and facilitate your experience with us in the best possible way.

UAE
1st floor, Incubator Building, Masdar City, Abu Dhabi, UAE
Office
00971-2-6446633
Mobile
00971-50-5419377
E-mail
info@btsconsultant.com
Working Hours
Sun to Fri 09:00 AM to 06:00 PM