telxperts telecom trainings

Advanced Cyber Security Online Certification Courses (overview)


Location: Australia

Duration: 1 Day

From-To: 2016-04-20 to 2016-04-20

Product Description

Course Overview

As the world moves towards faster internet connections and data exchange technology, the risk of network outages, computer viruses and data hacking has also raised. Consequently the need for cyber security is in demand to prevent unauthorized access to sensitive business and personal information, confidential data, computers and networks that can be life threatening.

Microsoft confirms that by 2025, people will be more dependent on internet and emerging online economies. By 2025, about 5 billion people will be connected to internet and cloud technology through 50 billion network devices. These facts show that as the internet and world wide web allows quicker information exchange, the IT managers get the responsibility of securing data.

Telxperts ltd provides deep insight to Cyber Security and intrusion detection for IT professionals, network and system administrators, and audit professionals to ensure computer and network security against cyber-attacks in this course. This course provides deep knowledge about wireless security essentials, wieless ethical hacking, penetration testing and defenses, hacker techniques, risk assessment and auditing, firewall protection and password management, web security policy, and anti-viral tools for windows security management and auditing.

Key Benefits for Participants

This course will provide the following key benefits to the attendees:

  • Understand the Cyber security fundamentals, network penetration testing, hacking techniques, incident handling and wireless security essentials
  • Understanding computer forensics, responses and investigation
  • Deep insight to Cryptography and Cryptanalysis
  • Learn Wireless Ethical Hacking, Penetration Testing, and Defenses, Risk Assessment and Auditing Networks, Perimeters & Systems
  • Understanding Host and Network Based Intrusion Detection
  • Understanding Honeypots, Firewalls and Perimeter Protection, Security Policy,
  • Deep insight to Password Management, Security Incident Handling and Information Warfare

Course Objectives

This course has the following major objectives:

  • Provide comprehensive knowledge about Security Planning, Assessment, and Implementation
  • Deliver insights about  Security Architecture, Models and Security and Risk Management
  • Provide detailed insight to Cryptography Algorithms, Cryptographic Attack and Defense Mechanisms
  • Detailed insights to IT Security Auditing, Operations Security, Attacks, and Threat Analysis
  • Comprehensive knowledge about Intrusion Detection, Attacks and Countermeasures
  • Provide deep understanding of Access Control Systems, Applications and Systems Security, Firewalls, Network and Web Security
  • HANDS-ON training and Exercises to understand windows security, system and network security


Course Outline

In “Advanced Cyber Security Certification Course (Overview)”, we cover the fundamentals of the Cyber Security and Wireless Security, while in “Advanced Cyber Security Certification Course (Comprehensive)” we cover the following course contents:

Introduction to Cyber Security

  • Overview of Network and Information Technology Security
  • Cyber Security Market Demand
  • Hacker Statistics
  • The Myth of 100-Percent Security
  • Attributes of an Effective Security Matrix
  • Security Standards
  • Elements of Security
  • Security Concepts and Mechanisms
  • Detecting and Analyzing Intrusions
  • Vulnerability Assessment: Protecting Your Organization
  • Exposing Network Weaknesses
  • Ethical Hacking and Countermeasures: Hands-On
  • Preventing Network and System Breaches

Elements of Security

  • The Security Policy
  • Encryption
  • Authentication
  • Specific Authentication Techniques
  • Access Control
  • Auditing
  • Security Tradeoffs and Drawbacks

Applied Encryption

  • Cryptography and Cryptanalysis
  • Encryption Review
  • Reasons to Use Encryption
  • Creating Trust Relationships
  • Rounds, Parallelization and Strong
  • Encryption
  • Symmetric-Key Encryption
  • Symmetric Algorithms
  • Asymmetric Encryption
  • Hash Encryption
  • Applied Encryption Processes
  • Public-key cryptography

Types of Attacks

  • Attack Categories
  • Brute-Force and Dictionary Attacks
  • System Bugs and Back Doors
  • Social Engineering and Non-Direct
  • Attacks

General Security Principles

  • Common Security Principles: Introduction
  • Be Paranoid
  • You Must Have a Security Policy
  • No System or Technique Stands Alone
  • Minimize the Damage
  • Deploy Companywide Enforcement
  • Provide Training
  • Use an Integrated Security Strategy
  • Place Equipment According to Needs
  • Identify Security Business Issues
  • Consider Physical Security
  • Protocol Layers and Security
  • TCP/IP Security Introduction
  • TCP/IP and Network Security
  • The TCP/IP Suite and the OSI Reference
  • Model
  • Physical Layer
  • Network Layer
  • Transport Layer
  • Application Layer

Securing Resources

  • TCP/IP Security Vulnerabilities
  • Implementing Security
  • Resources and Services
  • Protecting TCP/IP Services
  • Simple Mail Transfer Protocol (SMTP)
  • Testing and Evaluating
  • Implementing New Systems and Settings
  • Security Testing Software
  • Security and Repetition

Firewalls and Virtual Private Networks

  • Access Control Overview
  • Definition and Description of a Firewall
  • The Role of a Firewall
  • Firewall Terminology
  • Firewall Configuration Defaults
  • Creating Packet Filter Rules
  • Packet Filter Advantages and
  • Disadvantages
  • Configuring Proxy Servers
  • Remote Access and Virtual Private Networks (VPNs)
  • Public Key Infrastructure (PKI)

Levels of Firewall Protection

  • Designing a Firewall
  • Types of Bastion Hosts
  • Hardware Issues
  • Common Firewall Designs
  • Putting It All Together

Detecting and Distracting Hackers

  • Preparing for the Inevitable
  • Proactive Detection
  • Distracting the Hacker
  • Deterring the Hacker

Incident Response

  • Planning for Response
  • Create a Response Policy
  • Decide Ahead of Time
  • Do Not Panic
  • Document Everything
  • Assess the Situation
  • Stop or Contain Activity
  • Execute the Response Plan
  • Analyze and Learn

Security Principles

  • Overview of Security Principles
  • Definition of Security
  • Evaluation Criteria
  • Security Levels
  • Security Mechanisms
  • Security Management
  • Windows Security
  • Windows Security Architecture
  • Linux Security
  • Pluggable Authentication Modules (PAMs)
  • Account Security
  • Securing Accounts: An Overview
  • Passwords
  • Verifying System State
  • Password Aging in Linux

File System Security

  • File System Security Overview
  • Windows File System Security
  • Remote File Access Control
  • Linux File System Security

Assessing Risk

  • Risk Assessment Basics
  • Security Threats
  • Windows  Security Risks
  • General UNIX Security Vulnerabilities
  • Keyloggers
  • System Port Scanning
  • UNIX Security Risks
  • NIS Security Concerns
  • NFS Security Concerns

Reducing Risk

  • Reducing Risk through Simplification
  • Patches and Fixes
  • Windows Registry Security
  • Reducing Risk in Linux Systems

Security Auditing

  • Introduction to Auditing
  • What Is an Auditor?
  • What Does an Auditor Do?
  • Auditor Roles and Perspectives
  • Conducting a Risk Assessment
  • Risk Assessment Stages
  • Discovery Methods
  • Discovery
  • Security Scans
  • Enterprise-grade Auditing Applications
  • Social Engineering
  • What Information Can You Obtain?

Auditing Server Penetration and Attack Techniques

  • Network Penetration
  • Attack Signatures and Auditing
  • Compromising Services
  • Common Targets
  • Routers
  • Databases
  • Web and FTP Servers
  • E-mail Servers
  • Naming Services
  • Auditing for System Bugs
  • Auditing Trap Doors and Root Kits
  • Auditing Denial-Of-Service Attacks
  • Combining Attack Strategies
  • Denial of Service and the TCP/IP Stack

Security Auditing and the Control Phase

  • Network Control
  • Control Phase Goals
  • UNIX Password File Locations
  • Control Methods
  • Auditing and the Control Phase

Intrusion Detection

  • What Is Intrusion Detection?
  • IDS Applications and Auditing
  • Intrusion Detection Architecture
  • IDS Rules
  • IDS Actions
  • False Positives
  • Intrusion-Detection Software
  • Purchasing an IDS
  • Auditing with an IDS

Auditing and Log Analysis

  • Log Analysis
  • Baseline Creation
  • Firewall and Router Logs
  • Operating System Logs
  • Filtering Logs
  • Suspicious Activity
  • Additional Logs
  • Log Storage
  • Auditing and Performance Degradation

Audit Results

  • Auditing Recommendations
  • Creating the Audit Report
  • Improving Compliance
  • Improving Router Security
  • Enabling Proactive Detection
  • Host Auditing Solutions
  • Replacing and Updating Services
  • Secure Shell (SSH)
  • SSH and DNS

Wireless Security

  • 802.11 Security Basics
  • Attacks and Risks
  • Rudimentary security measures
  • Station Security
  • Gateway Security
  • Intermediate Security Measures
  • Advanced Security Measures
  • Hardware & Software Solutions
  • Prevention & Countermeasures
  • Implementation and Management

HANDS-ON to provide practical experience of system and network security analysis and management.

Delivery Options

  • Onsite
  • Online


Who Should Attend

Security Officers, IT Professionals and Auditors, Security Professionals, Site Administrators and anyone who is concerned about the integrity of the network infrastructure and cyber security.


There are no reviews yet.

Be the first to review “Advanced Cyber Security Online Certification Courses (overview)”

Your email address will not be published. Required fields are marked *