Length: 5 Days
TONEX Cyber Security Certificate- Part 1 Vulnerabilities and Risk Management
Cyber Security Certificate Description
Cyber security certificate-part 1, vulnerabilities and risk management by TONEX is designed for the IT professionals to accomplish changes to the recent advancement toward cyber security, vulnerable cyber-attacks, user interface problems related to the system privacy, and malware secured networks.
The cyber security certificate part 1 introduces you to the latest internet security threats and vulnerabilities and different methods of risk management. Whether you are an executive, IT professional, or IT system administrator, this certificate will help you to identify any type of threats in cyber world, assess the vulnerabilities and provide plans for managing the risks caused by these threats.
TONEX has served the industry and academia with high quality conferences, seminars, workshops and exclusively designed courses in cyber security area and is pleased to inform professional fellows about a comprehensive certificate program on Cyber Security including three different areas.
The first chapter of the cyber security certificate by TONEX is dedicated to identify vulnerabilities and risk management techniques in cyber security. This will facilitate the cyber security studies to enable the realization of a secure system free of attacks. The first part of certificate training program focuses on key principles of vulnerabilities:
- Understanding the cyber security concept and professional terms used
- Learning the definition of threats and different types of threats in the system security
- Understand the concept of network in cyber security and effect of internet in modern cyber security
- Identify the network attacks and network security architectures
- Recognizing the malwares, and different types of viruses in modern cyber security
- Learning the information assurance and system security issues
- Understanding the network security concepts and firewalls
- Ability to recognize the cyber criminals for website security assurance
- Identifying the insider threats in cyber security
- Risk management techniques for cyber threats
- Understand the concept of computer security and cryptography
- Learning the malware definition and different types of malwares
- Explaining the different classifications of malwares
- Understanding the different types of Trojans as the main type of malware
- Understanding the concept of exploits and their classifications in cyber security
- Applying different methods to detect the exploits and malwares
- Incident prevention studies in case of malware attacks
- Conducting static and dynamic malware analysis
- Understanding of human computer interaction
- Basics of usable security and design
- Explaining the importance of computer security
- User studies for usable security
- Identifying the usable privacy and security in networks
- Designing the system for secure interaction
- Designing procedures for trustworthy system
- Learning the privacy issues and human computer interactions
- Considering authentication and passwords in secure design
- Secure communication interfaces in usable security
Cyber security certificate by TONEX-part 1, vulnerabilities and risk management also provides the audience with a variety of workshops, labs, and in class activities which help you to understand the physical meaning of threats, risk management and security design.
Audience
The cyber security certificate-Part 1, vulnerabilities and risk management training is a 5-day training designed for:
- Executives working in security area
- IT professionals
- Network engineers, security analysts, policy analysts
- Security operation personnel and network administrators
- System integrators and security consultants
- Cyber security professionals and computer engineers
- Security traders
- Technicians, operators and maintenance personnel in cyber security area
Training Objectives
Upon completion of the cyber security certificate- part 1, vulnerabilities and risk management training, the attendees are able to:
- Understand the foundation and history behind the cyber security
- Explain different types of threats and attacks in cyber world
- Understand how to recognize the threats and classify different methods of defense
- Process the risk management techniques in networks
- Identify different types of spywares, malwares or malicious codes in cyber security
- Understand the policies and regulations of cyber security networks
- Manage the detection and protection solution depends on the type of attack
- Identify the attackers and understand the method of hacking in different cyber secured networks
- Define types of incidents in cyber security
- Access additional external resources to supplement knowledge of cyber security
- Understand the foundation and history behind the computer security
- Explain different types malwares and consequences of malwares to the computer security
- Understand the different classification of malwares in network security
- Recognize the different types of Trojans and Worms as the most common types of malwares
- Describe the exploits and their different types and consequences
- Explain the malware detection algorithms and approaches
- Understand the malware prevention studies
- Describe the incident response methodologies in case of malware attacks
- Understand the basics of human computer interaction
- Describe the concept of computer security and requirements of a usable secured system
- Describe how users can improve or analyze the usable system security
- Develop the usable privacy concepts and differentiate them with usable security
- Design the secure interaction usable system free of threats or malwares
- Understand the trust layers in usable security and design a trustworthy secured system
- Describe the authentication and password related issues in usable security and manage to control the problems
- Explain the concept of public key infrastructure (PKI) and secure communication principles and analysis methods
Training Outline
The cyber security certificate- part 1, vulnerabilities and risk management training consists of the following lessons, which can be revised and tailored to the client’s need:
Introduction to Cyber Security
- Definition of Cyber security
- Information security principles
- System engineering approaches for Cyber security
- Cyber world
- Cyber space
- Cyber domain
- Cyber ecosystem
- Cyber culture
- Cyber environment
- Cognitive layer of cyber world
- Service layer of cyber world
- Semantic layer in cyber world
- Syntactic layer of cyber world
- Physical layer of cyber world
- Professional terms used in cyber security
- concepts and approaches in cyber security
- impact of legal issues in cyber security
- online security resources
- Basic security terminology
- Microsoft security advisor
Threats and Vulnerabilities
- Threats to be dangerous for the system security
- Definition of threats
- Different types of threats
- System security in one term
- Phishing and spear phishing
- Malicious code
- Weak and default passwords
- Unpatched or outdated software vulnerabilities
- Removable media
Concept of Network and Effect of Internet in Cyber Security
- Basics of networks
- Physical network, Local network
- Speed of a network
- concept of connection speed
- Data transmission
- IP address
- History of the internet
- Basics of network utilities
- Network devices important for cyber security
- network communication
- Importance of network communication in cyber security
- media access control (MAC) addresses
- Uniform resource locators (URL)
- Critical infrastructures
- Energy transmission and distribution network
- Telecommunication and information system network
- Community technology network
- Financial system network
- Food supply network
- Security network
- Health care system
- Supervisory control and data acquisition system (SCADA)
- Responsibilities of cyber security
- Cyber security training
- National and international cooperation toward cyber security
Network Attacks
- DOS Attacks
- Denial of Service Flooding Attacks
- Disassociation Attacks
- Disclosure Attacks
- Reading/Revealing Information
- MITM Attacks
- Modification Attacks Changing Information
- Destructive Attacks
- Escalation of Privilege
- Network Security Architectures
- Sniffing
- Password grabbing
- Brute Force
- Password attempts
- Buffer Overflows
- Spoofing Attacks
- Forging IP/MAC/Etc.
- Flooding: SYN, UDP, ICMP
- Flooding Redirection: using ICMP, ARP, STP, MITM Attacks
- Anti-Virus: Worms, Viruses, Trojans Masquerading Social Engineering
Malware in Cyber Security
- Viruses as the most common threats
- Spreading a virus
- Common types of viruses in Cyber Security
- W32
- Netsky-p
- Troj
- Invo-zip
- MacDefender
- Sobig virus
- Mimail
- Nonvirus
- How to avoid viruses?
- Trojan Horses
- Well-known Trojans
- Auto start of Trojans
- Buffer-overflow attack
- Sasser virus
- Spyware
- Legal usage of spyware
- How to identify a spyware
- Rootkit
- Malicious web-based code
- Logic bombs
- Spam
- Detecting viruses and spywares
- Antivirus software
- Antispyware software
Information Assurance in Cyber Security
- Why should we protect the network?
- Concept of confidentiality
- Concept of integrity in information assurance
- Availability of information
- Management process
- Network protection
- Risk management
- Knowledge of your team
- Personnel training for information assurance
- Understanding the threat
- Securing the system
- Personal devices security
- Common access card security
- Continuity of operation plans
- Facility disaster recovery plan
- Information technology contingency plan
- Incident response
- Information assurance enforcement
Network Security
- The ISO/OSI reference model
- Popular networks
- UUCP
- The language of the internet
- Open design
- TCP
- UDP
- Risk management; vital part of network security
- Destructive behavior
- Unauthorized access
- Firewalls and network security
- Hybrid system network security
- Single point of failure in network
- Secure modems/dial back system
- Crypto-capable routers
- Virtual private networks
Website Security in Presence of Cyber Criminals
- Updating the software
- Close the access resources
- Credential security
- Performing the back ups
- Hosting companies
- Website builders
- Backup functions
- Dynamic cloud hosting
Insider Threats in a Cyber World
- Definition of insider threat
- Location of insider threats on security agenda
- Growing insider threats
- Active directory and insider threats
- Network management and compliance
- Trends of insider activities
- Enterprise-wide risk assessment for insiders threats
- Insider threat awareness incorporation into security training
- Enforcing policies and controls
- Monitoring suspicious or disruptive behavior
- Managing the negative issues regarding the insider threats
- Strict password implementation
- Recognizing the assets
- Separation of duties and least privilege
- Beating insider threats
Risk Management Techniques in Cyber Security
- Identifying the cyber criminals
- Economic companies as a cyber-threat
- Identifying the hackers
- Risk management process
- Implementing industry standards
- Evaluating and managing the organization
- Providing oversight
- Incident response development
- Situational awareness of cyber threats
- Risk management regime
- User education
- Incident management
- Malware protection
- Network security management
- Risk management applications
- Strategic planning
- Resource decisions
- Operational planning
- Real-world events
Introduction to Malwares
- Definition of Malware
- Malicious Software (Malware)
- Malware effect to user’s device
- Examples of Malwares
- Computer virus
- Boot sector virus
- Excel micro virus
- Word micro virus
- Script viruses
- Keyloggers
- Password stealers
- Backdoor Trojan
- Crimeware
- Spyware
- Adware
Malware Classification
- Classification based on least threat results
- Classification based on great threat results
- Exploits
- Rootkits
- Trojans
- Backdoors
- Viruses
- Worms
- Email Worms
- Networms
Different Types of Trojans and Worms
- Trojan Dropper
- Trojan Downloader
- Trojan PSV
- Trojan Spy
- Trojan DDOS
- Trojan Ransom
- Trojan Game Thief
- Trojan IM
- Trojan Banker
- Trojan SMS
- Trojan Proxy
- Trojan Arcbomb
- Trojan Clicker
- P2P Worm
- IRC Worm
- IM Worm
Different Classification of Exploits
- Categories of exploits
- Exploits by type of vulnerability
- Local or remote exploits
- Results of exploits
- Pivoting
- Proxy pivoting
- VPN pivoting
- Techniques of gaining Foothold
- Shell code
- Integer overflow vulnerabilities
- Stack-based buffer overflows
- Stacks upon stacks
- Crossing the line
- Protecting against stack-based
- Buffer overflows
- Addendum; stack-based buffer
- Overflow mitigation
- Format string vulnerabilities
- SQL injection
- Protection against SQL injection
- Malicious PDF files
- Creating malicious PDF files
- Reducing the risks of malicious files
- Web exploit tools
- Features of hiding
- Commercial web exploit tool
- Proliferation of web exploit tools
- DOS conditions
- Brute force and dictionary attacks
- Misdirection method
- Reconnaissance method
- Disruption method
- Cross site scripting (XSS)
- WarXing
- DNS amplification attacks
- Protection over DNS amplification attacks
Malware and Exploit Detection
- Detecting wide range of existing malicious programs
- Detecting new modification of known malwares
- Detecting packaged files
- Antivirus programs
- Effective computer protection policy
- Data security
- Digital identity security
- Finances security
- Frequently updated drivers for all malware types
- Detecting malware creators
- Vandals
- Swindlers
- Blackmailers
- Malware criminals
- Anti-malware technology
- Security state assessment
- Anti-Malware analysis
- Extensive data analysis
- Rigorous analysis
- Integrated response
- Advanced malware detection
- Streamlined management
- Challenges regarding anti-malware technologies
Malware Incident Prevention
- Malware incident policies
- Awareness
- Vulnerability mitigation
- Patch management
- Least privilege
- Host hardening measures
- Threat mitigation
- Antivirus software
- Spyware detection and removal utilities
- Intrusion prevention systems
- Firewalls and routers
- Application settings
Malware Incident Response
- Preparation
- Maintaining malware related skills
- Facilitating communications and coordination
- Acquiring tools and resources
- Malware detection
- Signs of malware incidents
- Malware incident characteristic
- Prioritizing incident response
- Containment
- Containment through user participation
- Automated detection
- Disabling connectivity
- Containment recommendations
- Identification of infected hosts
- Eradication
- Recovery
- Future of malwares
Malware Static Analysis
- Checking file signature
- Malware strings
- Import and exports
- Encryption and packing
- Tools: md5sum, strings, PEView, PEiD, Resource Hacker, Dependency Walker
- Advanced static analysis
Malware Dynamic Analysis
- Virtual malware analysis lab
- Monitoring using process monitor
- Analyzing the process using process explorer
- Comparing registry snapshots with Regshot
- Monitoring malware network traffic
- Debugging
Basics of HCI Methods, Usable Security and Design
- Usability
- What is human computer interaction (HCI)?
- Security bugs
- Software wizard
- HCI bibliography
- Interaction design for secure systems
- Usable security blog
- Human communication
- Mental and psychological models
- Design methodology
- Introduction to HCI method
Basics of Computer Security
- What is privacy?
- Privacy regulations
- Privacy policies
- Privacy preferences
- Privacy risks
- The unconcerned
- Pragmatist
- Security safeguard principle
- Concept of security
- Preventative
- Detective security
- Corrective security
- Cryptography
- Symmetric cryptography
- Usability
- Access control
- Authentication
- Trustworthiness
User Studies for Usable Security
- Chameleon
- Minimizing the damage by worms, viruses
- Interactive prototype
- Prevention, detection, action rule
- Low Fidelity Prototyping (Li-Fi)
- Role based access control (RBAC)
- Vault
- Communications
- Default
- Testing
- System
- Application of anti-spyware
- Toolkits with user interface
- P2P software
- Usability troubles
- Design methods
- Design tools
- Cognitive walkthrough
- File sharing study
- Usability guidelines for P2P
Usable Privacy and Security
- Psychological acceptability
- Unstable security
- Usability design
- Differentiation of users and enemies
- Security chain
- Principles of security
- /Security ineffective products
- Educating the users
- Good password
- Password security
- Cracked password
- Motivation of protection
- Designing a usable system
- Centered design
- Regime changing
- Password mechanism
- Password considerations
- Supporting production tasks
- Involving stakeholders
- AEGIS process
- Risk analysis
- Security design
- Modeling assets
- Gathering participants
Secure Interaction Design
- Designing secure interfaces
- Problems of security
- Viruses
- Spyware
- Outline tracking
- Designing principles
- Firefox extension
- Cookies
- Phishing
- Tracking
- Petname
- Cookie Culler
- Cookie Button
- Distrust
- Anti-paranoia
Designing Trustworthy Secure System
- Concept of trust
- Consumer advice site
- E-commerce sites
- Lost or lacking trust
- Fundamental to security is trust
- Trust layers
- Granularity
- Processing strategies
- Credibility and computing technology
- Presumed credibility
- Experienced credibility
- Trustworthiness
- Trust models
- Trust design guidelines
- Defense against phishing; dynamic security skin
- Security toolbars
Privacy Design
- Privacy issues and Human Computer Interaction (HCI)
- User centric privacy space framework
- Pitfalls in privacy design
- Privacy guideline development
- Location disclosure application
- GUI design; overview, entries
- Privacy practices of internet users
- Visualizing privacy
- Privacy policy and preferences
- Privacy analysis
- Anonymity; Usability and the network effect
- Stopping spyware at the gate
- Peripheral privacy
- Informed consent by design for web browser privacy
- Social approaches to end-user security and privacy management
- Worry-free web design
- Hardening browsers
- Semantic attacks
Authentication and Passwords
- Compliance defects
- Improving the user interface
- Enforcement mechanism
- Graphical passwords
- Security of graphical passwords
- Encryption application
- Reducing the trust in network
- Server delegation
- Reconstruction of hardened password
- Dictionary attacks
- Identity management
- Mnemonic passwords
- Human selection of text passwords
- Password cracking
- Randomly generated Human pronounceable passwords
Secure Communications
- Public Key Infrastructure (PKI)
- Communication under PKI
- ITU-T standard for PKI
- V3 certificate
- Hierarchy of PKI
- Non-repudiation of signatures
- Certificate revocation
- CRLs
- Request/response protocol
- Encrypting email with PKI
- Problems of PKI
- Simple PKI (SPKI)
- Web of trust
- Key management issues
Workshops and Labs for Cyber Security Certificate-Part1
- Risk Response monitoring and control
- How to Identify Threats and Vulnerabilities in an IT Infrastructure
- Execute risk strategies
- Align Threats and Vulnerabilities to the Risk Management Controls
- Contingency plans and workarounds
- Risk evaluation
- Reassessing risk
- Perform a Qualitative Risk Assessment for an IT Infrastructure
- Risk documentation
- Identify Risks, Threats, and Vulnerabilities in an IT Infrastructure Using Zenmap GUI (Nmap)
- Analyzing malicious Microsoft Office (Word, Excel, PowerPoint) documents
- Examining static properties of suspicious programs
- Performing behavioral analysis of malicious Windows executable
- Analyzing malicious Adobe PDF documents
- Bypassing anti-analysis defenses
- Recognizing malware
- Intercepting network connections in the malware lab
- Interacting with malicious websites to examine their nature
- JavaScript analysis complications
- x86 Intel assembly language primer for malware analysts
- Patterns of common malware characteristics at the Windows API level (DLL injection, function hooking, keylogging, communicating over HTTP, etc.)
- Building Better Passwords: We’ll use a tool that shows how long it takes to compromise various passwords via a brute force attack
- Simple Desktop Security with Chameleon
- The Case for Usable Security
- Creating Usable Security Products for Consumers
- Fighting Phishing at the User Interface
- User-Centric Privacy Space Framework
- Firefox and the Worry-free Web
- The Memorability and Security of Passwords
- Graphical Password Schemes
- Achieving Usable Security in Groove Virtual Office
Cyber Security certificate- Part 1 Vulnerabilities and Risk Management