Difference between revisions of "GainCloud Advanced Security Training"
From Business Apps Cloud
(2 intermediate revisions by one user not shown) | |||
Line 1: | Line 1: | ||
<p><span style="font-size: small;">Classroom Training Document and Materials eShare:</span></p> | <p><span style="font-size: small;">Classroom Training Document and Materials eShare:</span></p> | ||
<!--GainCloud eShare Button Code - AJAX Button--> | <!--GainCloud eShare Button Code - AJAX Button--> | ||
− | <div style="width: 160px; padding-left: 20px; text-align: center;"><a style="text-decoration: none;" href="https://www. | + | <div style="width: 160px; padding-left: 20px; text-align: center;"><a style="text-decoration: none;" href="https://www.egaincloud.com/share/viewshare.do?mainsharecode=MS4281281"> <img src="https://www.egaincloud.com/my/htdocs/images/folder_blue_stuffed.png" alt="Cloud based Secure Online Private Share Folder For Software" /> <br /><strong>Training Material eShare</strong></a></div> |
<!--End Of Button Code--> | <!--End Of Button Code--> | ||
<p><span style="font-size: small;"><br /><span style="text-decoration: underline;"><strong>Total Instruction Hours:</strong></span><br />21 hours of Classroom Instructions<br />30 hours of Hands-on Lab<br />9 hours of Testing (in 9 separate Tests)<br /><br /><strong>Net total is 60 hours of curriculum</strong></span></p> | <p><span style="font-size: small;"><br /><span style="text-decoration: underline;"><strong>Total Instruction Hours:</strong></span><br />21 hours of Classroom Instructions<br />30 hours of Hands-on Lab<br />9 hours of Testing (in 9 separate Tests)<br /><br /><strong>Net total is 60 hours of curriculum</strong></span></p> | ||
Line 23: | Line 23: | ||
</blockquote> | </blockquote> | ||
<p><span style="font-size: small;"> <br />== <span style="font-size: small;">[CLASS] Security Management ==</span><br /><span style="font-size: small;">(3 Hour) </span><br /></span></p> | <p><span style="font-size: small;"> <br />== <span style="font-size: small;">[CLASS] Security Management ==</span><br /><span style="font-size: small;">(3 Hour) </span><br /></span></p> | ||
− | <p><span style="font-size: small;"><span style="font-size: small;"> | + | <p><span style="font-size: small;"><span style="font-size: small;"><span style="font-size: small;"> >> </span>Intrusion Prevention<br /><span style="font-size: small;"> >> </span>VPN<br /><span style="font-size: small;"> >> </span>Wireless Security </span> <span style="font-size: small;"> <br /><span style="font-size: small;"> >> </span>Vulnerability Analysis<br /></span><span style="font-size: small;"> >> </span>Security Policies<br /> >> Corporate Security Policies<br /> >> Hackers Hat - breaking corporate security code<br /> >> Endpoint Assessments<br /> >> Enabling Intrusion Prevention System (IPS)<br /> <br /><span style="font-size: small;"> >> </span>Best Practices - Cyber-Security<br /> >> Traditional Hacking Techniques<br /> >> Monitor telemetry data<br /> >> Event Coorelation for alarms<br /> >> Risk Analysis and Mitigation<br /> <br /><span style="font-size: small;"> >> </span>Review malware signatures<br /> >> Viruses & Worms<br /> >> Network Trace gathering and analysis<br /> <br /><span style="font-size: small;"> >> </span>Review common hacking techniques and kits<br /> >> Backdoor<br /> >> Botnets<br /> >> DoS and DDoS<br /> >> Tunnel Attacks<br /> </span></p> |
− | + | <p><span style="font-size: small;">== <span style="font-size: small;"><span style="font-size: small;"> </span>[CLASS] Leading Companies and Leading Products ==</span><br /><span style="font-size: small;">(3 Hour)</span> </span></p> | |
− | <p><span style="font-size: small;">== <span style="font-size: small;"><span style="font-size: small;"> </span>[CLASS] Leading Companies and Leading Products ==</span><br /><span style="font-size: small;">(3 Hour)</span> | + | <p><span style="font-size: small;"><span style="font-size: small;"> >> </span>How-to-use, why-to-use, where-to-apply<br /><span style="font-size: small;"> >> </span>Top 3 Products - in-depth</span></p> |
<p><span style="font-size: small;"><br /></span></p> | <p><span style="font-size: small;"><br /></span></p> | ||
<p>== <span style="font-size: small;">[CLASS] Network analysis and deep-dives ==<br /></span></p> | <p>== <span style="font-size: small;">[CLASS] Network analysis and deep-dives ==<br /></span></p> | ||
− | <p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span>Identification:<br /> | + | <p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span>Identification:<br /><span style="font-size: small;"> >> </span>Identify Compromised System<br /><span style="font-size: small;"> >> </span>Isolate Zombie<br /><span style="font-size: small;"> >> </span>Stopping malware<br /> </span></p> |
− | <p><span style="font-size: small;"><span style="font-size: small;">== [CLASS] Intrusion signatures & footprints ==</span><br /><span style="font-size: small;">(3 Hour) </span>-<br /> | + | <p><span style="font-size: small;"><span style="font-size: small;">== [CLASS] Intrusion signatures & footprints ==</span><br /><span style="font-size: small;">(3 Hour) </span>-<br /><span style="font-size: small;"> >> </span>Signature Analysis<br /><span style="font-size: small;"> >> </span>P32/PDOM screenshots<br /><span style="font-size: small;"> >> </span>RootKits<br /></span></p> |
− | <p> | + | <p> </p> |
<p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Prevention - Perimeter Security ==<br /></span></span></p> | <p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Prevention - Perimeter Security ==<br /></span></span></p> | ||
− | <p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span><br /> | + | <p><span style="font-size: small;"><span style="font-size: small;">(3 Hour) </span><br /><span style="font-size: small;"> >> </span>Introduction<br /><span style="font-size: small;"> >> P</span>KI - Create cert, sign them, install them, trust them and external providers</span></p> |
− | <p><span style="font-size: small;"><br /> <br />== <span style="font-size: small;">[CLASS] Firewalls & Rulesets ==</span><br /><span style="font-size: small;">(3 Hour) </span><br /> - ACE, ACL, ACI<br /> - LDAP and Directory Infrastructure<br /> | + | <p><span style="font-size: small;"><br /> <br />== <span style="font-size: small;">[CLASS] Firewalls & Rulesets ==</span><br /><span style="font-size: small;">(3 Hour) </span><br /> - ACE, ACL, ACI<br /> - LDAP and Directory Infrastructure<br /></span></p> |
<p><span style="font-size: small;"><br /></span></p> | <p><span style="font-size: small;"><br /></span></p> | ||
<p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Adaptive Security ==</span> <br /><span style="font-size: small;"> </span></span></p> | <p><span style="font-size: small;">== <span style="font-size: small;">[LAB] Adaptive Security ==</span> <br /><span style="font-size: small;"> </span></span></p> |
Latest revision as of 17:52, 18 October 2016
Classroom Training Document and Materials eShare:
Total Instruction Hours:
21 hours of Classroom Instructions
30 hours of Hands-on Lab
9 hours of Testing (in 9 separate Tests)
Net total is 60 hours of curriculum
The Course Curriculum for this Advanced Security Training:
[CLASS] Introduction to networks security
(3 Hour)
- Network Concepts
>> IPV4, Device ID, Network cards - hard/soft
>> Authentication Factors
>> Authentication & Authorization
>> New Authentication Systems
>> LDAP and Directory Management
>> Traditional data storage Vs. Tree structure
>> Caching Vs Searching
>> Profiling Vs Tabulation
>> Active Directory and other common LDAP vendors
>> Virtual and Meta
[CLASS] Infrastructure Security
(3 Hour)
>> Context Aware Firewalls (ASA)
>> Policy Management
>> Object Definition and ACL Management (ASA)
>> Infrastructure & Security Protocols
>> Enterprise Security Products (PDF and Notes)
>> Perimeter Security
>> In-Network Security
>> DNS Security is Corporate #1 Priority
>> Identity Management
- IAM - Unified identity management - self reg, identity lifecycle, provisioning, sync
- OAM - centralized access management - Authn and Authz - for Web, service-based, mobile,..
- OID - Centralized data storage & encryption - encrypt data-in-storage & data-in-transit - DLP
- Admin - Delegated admin, admin-overview, Rule based admin oversight, Re-Certification
- Audit - Yearly, Quaterly and monthly compliance checks, internal audit and external audits
- Compliance - Support for SSAE16, SOC1, SOC2, PCI and SOX