Cyber Security Essentials

What every security expert needs to know!

Kuala Lumpur, Malaysia - March 19-21, 2014


  • Day ONE

    Module One: Understanding Networking Concepts

    • Understanding Network Types, Protocols, Network Wiring, and VoIP, CIA, DAD
    • TCP/IP and IOS protocols security implications
    • Understanding IPv4, IPv6, TCP,UDP, ICMP and DNS behaviors
    • Introduction to Cisco IOS, Routers, and Routing Protocols

    Module Two: Physical Security and Information Assurance

    • Facility and technical controls
    • Personal safety and understanding physical security threats
    • Understanding risk models and risk analysis techniques
    • Risk calculation techniques
    • Password management techniques

    Module Three: Incident Management

    • Authentication vs. authorization vs. access control, privacy vs. trust, confidentiality vs. privacy.
    • Writing and implementing security policies, contingency and continuity planning, and business impact analysis
    • Incident handling methodologies and incident management techniques

    Module Four: Defense in Depth

    • Understanding layers of protection and defense in depth
    • Crime detection and investigation methods
    • Web security and web application defense techniques
    • Information warfare and defensive strategies
    • Understanding Advanced Persistent Threats
  • Day TWO

    Module One: Understanding Network Defense

    • Firewalls and perimeter protection defense techniques
    • Honeypots, HoneyNets, and Honey Tokens
    • Intrusion detection and prevention systems
    • Network logs analysis

    Module Two: Attack Methods

    • Understanding attack phases
    • Buffer overflow attacks
    • Most well-known web attack techniques
    • How to deliver bad news of an attack in business meetings

    Module Three: Wireless and Mobile Security

    • Common wireless and mobile protocols and topologies
    • Understanding Wireless attack and defense techniques
    • Most profound mobile security risks
    • Best practices for cloud security

    Module Four: Practical Understanding of Cryptography

    • Cryptology and important crypto algorithms
    • Hashing techniques
    • Secure mail transfer systems
    • Steganography
  • Day THREE

    Module One: Understanding Windows Security Infrastructure

    • Workgroups and local accounts
    • Active Directory, domain users and groups
    • User permission and right management

    Module Two: Windows Security Management

    • Windows incident detection techniques
    • Windows security templates and policies
    • Service pack and patch management
    • Securing Windows network services

    Module Three: Linux Security Basics

    • Linux command line basics
    • Linux file and objects permissions
    • Basic Linux shell scripting
    • Networking and service setup in Linux

    Module Four: Open Source Security Tools and Techniques

    • Linux incident detection techniques
    • File integrity verification techniques
    • Working with Linux sniffers and introduction to Snort
    • Analyzing Linux log files