Pioneers in Training on GNU/LINUX and FOSS Technologies. Your IP : 54.156.47.142 Country : UNITED STATES Region : VA Longitude : -77.4728 Latitude : 39.0481 Forex Rate : $ 1
LLC 502 CYBERSECURITY AND ETHICAL HACKING II TRAINING
COURSE DESCRIPTION
Cybersecurity and Ethical Hacking II  covers protocols review, traffic analysis, intrusion detection and prevention systems (IDS/IPS), snort configuration and management, web application security and firewalls, modsecurity, scripting and network forensic analysis. It is a hands-on practical training  to help you perform network traffic analysis, configure intrusion detection and prevention systems and keep them up to date with effective signatures and rules to match new attacks. The main objective of this course is to impart knowledge and hands-on skills to defend  your organization from cyber crime, warfare, espionage and hacktivism.
COURSE OUTLINE

1. Protocols Review

  • TCP/IP layers
  • TCP/IP protocol stack
  • TCP/UDP
  • ICMP
  • DNS and HTTP
  • IPSec and IPv6
  • Microsoft protocols
  • Peer-to-Peer Protocols

2. Traffic Analysis with Tcpdump

  • Capturing traffic using tcpdump
  • Writing capture filters
  • Analysing crafted filters and abnormal behaviour of IP, TCP and UDP

3. Traffic Analysis with Wireshark and TShark

  • Capturing traffic using Wireshark
  • Using filters to analyse the network traffic
  • Analysing crafted packets and abnormal behaviour of IP, TCP and UDP using tshark

4. Intrusion Detection and Prevention Systems (IDPS)

  • IDS/IPS Components
  • Network, Host and Wireless IDS
  • Network Behaviour Analysis (NBA)
  • Detection Methodologies protocols
  • Packet capture methods
  • Deployment architectures
5. Snort
  • Snort Architecture
  • Snort Deployment and Configuration
  • Sniffer Mode, Packet Logger Mode and Network Intrusion Detection System (NIDS) Mode
  • Managing Rules – Oink Master, Pulled Pork
  • Writing Snort Rules – Barnyard, Base, Sguil and Snorby

6. Web Application Security and Firewalls

  • Firewalls
  • ModSecurity
  • Architecture and modes of operation
  • Writing rules against attacks
  • Writing custom rules with regular expressions
  • Analysing modsecurity output
  • Modsecurity rule updater

7. Forensics Analyst Tools, Scripting and Traffic Injection

  • Analyst Tools – Arpwatch, Ntop, PADS, p0f, ngrep, tcpflow, SANCP, chaosreader
  • Scripting for traffic analysis
  • IDS testing for traffic injection
  • Network forensics analyst tools

8. Managing Intrusion

  • Detection Systems
  • False Positives, False Negatives and Severity of Attacks
  • Intrusion Detection Interoperability
  • Push vs Pull Reporting

AUDIENCE

  • ICT Managers / Directors
  • System and Network Administrators
  • Database Administrators
  • Security Officers
  • Finance Officers and Auditors
  • Software Engineers, Web and Mobile Application Developers

PREREQUISITE

  • Cybersecurity and Ethical Hacking I

DURATION

  • 5 Days (30 Hours)