Companies large and small face a critical stage; cyber-attacks have transformed dramatically over the past few years.  Unfortunately, organizations are still being breached too often, and are under more pressure than ever to secure their systems.

The Network Security course aims to address cyber challenges experienced on the network level. It will cover various attack techniques and how to defend from them. By the end of the course, participants will be able to build and maintain a secure network, protect data, manage vulnerabilities, implement strong access control measures, and regularly monitor the network for inconsistencies.

The course sets the groundwork for a later specialization in cyber forensics, advanced cyber defense and penetrating testing.

The course targets participants with basic knowledge in IT or networking, who wish to understand corporate cyber security and cyber defense on a technical perspective. Primarily:

  • IT security personnel
  • IT/network administrators
  • Incident responders
  • Security analysts
  • Basic knowledge in IT and networking.
  • Working experience with virtualization.
  • CS001 provides a solid foundation of preliminary knowledge required for this course.
}

100 Hours

Cyber Security

h

Certificate: No

Price: contact us for more details

Leave your details

Course Outline

Objectives

  • Becoming familiar with the cyber threat landscape that modern organizations face.
  • Acquiring the necessary knowledge and tools to defend the corporate network from various cyber threats.
  • Identifying when attacks are happening on the network.
  • Testing networks and systems for vulnerabilities.
  • Learning how to analyze network traffic and create a monitoring environment to operate as a mini- Security Operations Center.
  • Preparing for and defending against cyber-attacks.
  • Becoming familiar with a variety of available tools for performing security-related tasks.

 

Course Outline

 

Module 1: Linux – 10 hours

During this module, students will study Linux configuration – how to adapt the system to the user’s needs, using basic commands, manipulation of text sections, running services, privileges, and bash scripting for automating tasks. This section will include practical exercises following each step.

  • Linux structure
  • Basic terminal commands and operators
  • Permissions:
    • Managing users on Linux
    • User
    • Group
    • Other
    • Special permissions
  • Running network services on Linux

 

Module 2: Cyber Security in the Organization – 8 hours

Large organizations these days suffer greatly from network attacks, and malicious intrusions. Those who manage the organization’s network, have an immense impact on ensuring its safety. This module will introduce participants to information security from an organizational perspective, and cover permissions over the network, configurations of firewalls and anti-viruses on an optimal level to maintain security.

  • Group Policy (GPO for maximum security)
    • Managing user privileges
    • Configuring file sharing and print services
    • Firewalls
      • Configuring Firewall rules
    • Permissions over the network
      • Network Policy Server (NPS)
      • Virtual Private Network (VPN)
    • Anti-Virus
      • How the anti-virus works
      • Anti-virus labs
    • Encryption on the network
      • BitLocker
      • EFS
      • TLS\SSL

Module 3: Cisco – 12 hours

This module will cover Cisco technology from aspects of network architecture and security to give participants a deeper understanding on how to deliver effective network security.

  • Introduction to Cisco technology:
    • Concepts
    • Cisco’s hardware
    • Packet Tracer (configuration and use commands)
  • Network protocols
    • OSI
    • TCP/IP
    • IPv4
    • IPv6
  • Routing & switching:
    • User types and definitions
    • Configurations
    • CLI commands
  • Routing protocols
    • OSPF
    • EIGRP
    • RIP
  • Access List

Module 4: Cyber Security Attack Vectors – 50 hours

This module will dive deeper into the world of cyber security, the primary goal being to teach participants to embrace the attacker state-of-mind in order to recognize the necessary defense mechanisms. Participants will deal with several types of malware, spyware and viruses, learn about hash functions, steganography, cryptography, and web attacking. They will have a glimpse into how wireless networks are attacked, and how the organization as a whole is compromised. Social engineering techniques and honey pots will also be demonstrated.

  • Types of malware:
    • Adware
    • Ransomware
    • Trojans
    • Viruses
    • Worms
  • Introduction to hashing
    • Different kinds of hash
    • Hash automation
  • Brute-Force attacks
    • Online attacks
    • Offline attacks
    • CPU vs. GPU
    • Common tools
    • Man-in-the-Middle
      • How MiTM works and some key concepts
      • MiTM on the network level
      • MiTM on the web-application level
    • Dos and DDoS attacks
    • Web hacking fundamentals
    • Steganography
    • Network scanning methods
      • Vulnerability research
        • OpenVAS
        • Nessus
        • SQLmap
      • Backdoors
        • Msfvenom
        • Reverse
        • Bind
        • HTTPS
      • Exploits
        • Well-known exploits
        • Recently discovered exploits
        • Zero-day exploits
        • Wi-Fi
          • RF technology
          • Finding hidden access points (APs)
          • Rouge APs
          • Breaking WEP
          • Breaking WPA/WPA2
        • Social-engineering
        • Honeypots
        • Cryptography basics

Module 5: Network Monitoring and Security – 20 hours

After covering attacks and offensive methods in the previous module, participants will master the corresponding defense techniques that need to be put in place. They will explore network infrastructure, focusing on investigating packets passing through the network, using various tools. Upon completion of this module, attendees will be able to identify anomalies on the network traffic and analyze its implications on security. Using open-source tools, the team will be able to set-up a mini-SOC (Security Operations Center) to operate as its main monitoring platform.

  • IDS/IPS security monitoring
    • Wireshark
    • TShark
    • Working with PCAP files
    • Snort
    • Bro
  • SIEM (Security Incident and Event Monitoring)
    • Installing an Open-Source SIEM
    • Configuring the SIEM
    • Log interception
    • Case studies