Cybersecurity Foundations
5-day hands-on training seminar, $3295
RCCSP
  Professional
    Education
       Alliance

Overview

In this hands-on network training course participants will learn about the challenges of designing a secure network, threats to which an organization's system is exposed, and ways to protect it. The course uses lectures and hands-on excercises during which participants will work with live viruses, including botnets, worms, and Trojans to gain a thorough understanding of internet security basics and best practices. Attendees will review standard cybersecurity terminology, compliance requirements, mitigate controls and work with live viruses including botnets, worms, and Trojans in a lab environment.

In addition to standard cybersecurity terminology and technical cybersecurity components, attendees will also learn about the non-technical aspects of cybersecurity for the purposes of risk mitigation exposure, including risk management, threat determination, disaster recovery, security policy management, and business continuity planning. This course provides an excellent foundation for individuals seeking CISSP, CEH, CISA, or CISM training.

Participants will learn:

  • Current cyber threats and cybersecurity site references
  • Government-mandated directives and compliance requirements
  • Cyber roles required to successfully design secure systems
  • The attack cycle perpetrated by malicious hackers
  • Enterprise policy requirements
  • Best strategies for securing the enterprise with layered defenses
  • How security zones and detailed logging augment information assurance
  • Forensic challenges and incident response planning
  • Risk management process
  • Goals achievable with auditing, scanning, and testing systems
  • Industry recommendations for maintaining secure access control
  • Standards-based cryptographic solutions for securing communications

Who Should Participate

Cybersecurity Essentials training course is ideal for security professionals, including security analysts, intel analysts, policy analysts, security operations personnel, network administrators, system integrators, VARS, and security consultants.

Agenda

1. The Cyber Battlefield

  • Critical Business Security
  • Worldwide Internet Growth
  • Security Fundamentals
  • Security Goals
  • Terminology Threats and Exposures
  • Exploits and Exposures
  • Hackers and Crackers
  • Attack Methods
  • Social Engineering
  • Common Attack Vectors
  • Traffic Analysis
    • Responding to Threats and Attacks
  • Documents and Procedures to Manage Risk
  • Vulnerability Scanners
  • Penetration Testing
  • The OSSTMM
  • NIST
  • Risks of Penetration Testing

2. The Structure of the Internet and TCP/IP

  • CNCI
    • Initiatives
  • Legal Compliance Standards
    • Acts
    • Federal Agency Compliance
    • Commercial Regulatory Compliance
  • Internet Leadership IANA
    • Regional Internet Registry
    • Protocols and RFCs
  • TCP/IP Model
    • Network Access Layer
    • Internet Layer
    • Host-to-Host Layer
    • Process Layer
  • Domain Name Service

3. Vulnerability Assessment and Tools

  • Vulnerabilities and Exploits
  • Vulnerability Assessment Tools
    • Application-Level Scanners
    • System-Level Scanners
    • System-Level Testing Tools
    • Open Source System-Level Scanner Tools
    • Commercial System-Level Scanner Tools
  • Advanced Attack Techniques and Tools
  • Commercial Exploit Tools
    • Free Exploit Tool: Metasploit
    • Free Exploit Tool: BeEF
  • Fuzz Testing
  • Preventing Exploits and Attacks
  • Patch Management
  • Common Vulnerabilities and Exposures
  • Alerts and Software
  • Tools
  • Vulnerability Research
  • Common Security Sites
  • Patch Management
    • Tools

4. Cyber Awareness

  • Social Engineering
    • Social Engineering Goals
    • What Makes Social Engineering Possible
    • Targets
    • Attacks
    • Phishing
    • Phishing via Email
    • Online Attacks
    • Statistical Data
    • Sources of Security Breaches
    • Preventing Social Engineering
  • Cyber Awareness: Policies and Procedures
    • Security Policy Topics
    • Social Media
    • Social Networking Sites

5. Cyber Attacks: Footprinting and Scanning

  • Footprinting
    • Gathering Information
    • Unearthing Initial Information
    • Internet Archive
    • People Search
    • Locations and Mapping
    • Job Boards
    • Financial Information
    • Google and Search Operators
  • Identifying the Target Network and Its Range
    • WHOIS Utility
    • DNS Online Search Tools
    • Traceroute
    • Footprinting Countermeasures
  • Detecting Live Systems
    • Bypassing Authentication
    • War Dialing
    • Wardriving
    • ICMP: Ping
    • Port Scanning
    • Performing TCP and UDP Scans
    • Port Numbers
  • TCP Flags
    • TCP ThreeWay Handshake
  • Port Scanning Techniques
    • TCP Full Connect Port Scan
    • TCP HalfOpen (SYN) Scanning
    • Nmap HalfOpen Scan
    • UDP Port Scan
    • Nmap Scan Types and Switches
    • Port Scanning Tools
    • OS Fingerprinting
    • Active Stack Fingerprinting
    • Passive Fingerprinting
  • Proxies and Anonymizers
  • Scanning Countermeasures

6. Cyber Attacks: Breaking and Entering

  • Password Attacks
  • Privilege Escalation
  • Maintaining Access
  • Windows Authentication
    • SysKey Encryption
    • LAN Manager Password Encryption
    • Windows LAN Manager and NTLM Hashes
    • Linux Password Encryption
    • SAM Database Insecurities
  • Password Extraction Cracking
    • Password Cracking Techniques
    • Password Cracking Tools
    • LCP
    • John the Ripper
    • Cain and Abel
  • Password Cracking Countermeasures
  • Covering Tracks
    • Principle of Exchange
  • Clearing the Logs
  • Hiding Tools, Files, and Programs
    • NTFS Alternate Data Streaming
  • Information Hiding: Methods
    • Steganography
    • Steganography Detection
    • Rootkits
  • Countermeasures: Rootkits

7. Cyber Attacks: Backdoors and Trojans

  • Malware
  • Trojans
    • Trojan Infection Mechanisms
    • Well-Known Trojans
    • Distribution Methods Wrappers
    • Trojan Autostart Methods
  • Covert Communications
    • Stealth Technique: Avoiding Detection
  • Backdoor Countermeasures
  • Malware Countermeasure
  • Anti-Spyware Software
  • Malware Countermeasure Practices

8. Cyber Assessment and Risk Management

  • Risk Management Steps
    • Determining ALE
    • CRAMM Process
    • Risk Management Lifecycle
  • Protected Assets
    • CIA Triad
  • Quantitative Risk Assessment
  • Threat Determination Process
  • Risk Assessment
    • Lifecycle
    • Steps
  • Vulnerability Categories
  • Business Assets vs. Risk
  • Benefits of Risk Management
  • Policy
  • Assessment

9. Security Policy Management

  • Security Policy
    • Use
    • Importance
    • Legal Issues
    • Example
  • Policy References
    • Policies, Guides, Standards, Procedures, and Controls
    • Security Policy Coverage Matrix
    • Example: Internet Security Coverage Matrix
    • Granular View of a Security Matrix
    • Basic Policies

10. Securing Hosts and Servers

  • Types of Hosts
  • General Configuration Guidelines
    • Clean Systems
    • Unnecessary Services
    • Warning Banners
    • Limiting Access
    • Configuring and Logging
  • Security Patches
  • Security Baselines
  • Traffic Filtering Monitoring
  • DoS Vulnerabilities
  • Server Hardening
  • Web Server Hardening
  • Mail Server Hardening
  • FTP Server Hardening
  • DNS Server Hardening
    • Other Servers
  • Workstation Considerations
  • Network Appliances
  • Wireless Access Hardening
  • VLAN Security
  • Software Attacks

11. Securing Communications

  • Applying Cryptography to OSI Model
  • Tunnels
  • Securing Services
    • Email
    • FTP and Telnet
    • SSL and TLS
    • Gateway-to-Gateway VPN
    • Host-to-Gateway VPN
    • IP Security
    • Wireless Access Communication
    • Wireless Security

12. Authentication and Cryptographic Solutions

  • Authentication
  • Authentication Issues
  • Cryptosystems Password Authentication
  • Hash Functions
  • Kerberos Cryptographic Benefits
  • Symmetric Key Encryption Asymmetric Encryption Digital Signatures PKI Components
  • Models
  • Policies
  • Lifecycle
  • Distribution

13. Firewalls and Edge Devices

  • General Security Integration
  • Services
  • Needs for Services
    • Security Zones
    • Filtering
    • Screened Subnets
    • Trusted Zones
    • Devices
    • Routers
    • Firewalls
    • DMZ Hosts
    • Other Security Considerations
  • Business-to-Business Communications
  • Exceptions to Policy
    • Special Services and Protocols
  • Configuration Management
  • Software Development Security
  • Certification and Accreditation
  • Common Criteria
  • Intrusion Detection and Prevention
  • Defense in Depth
  • Network Device Logging
    • Host Monitoring and Logging
    • Events Correlation
    • Placement of IDS Monitors and Sensors
    • Monitoring
    • Host-Based and Network-Based Differences
    • Policy Management
    • Behavioral Signatures
    • IDS and IPS Weaknesses
    • Encryption
    • Incorrect Configuration

14. Forensic Analysis

  • Incident Handling
  • Security Incident Response
    • Time and Reaction Sensitivity
    • Incident Handling Issues and Considerations
    • Response Procedures
    • Evidence
    • Logging
    • Log Analysis Tools
    • Active Ports
    • Dependency Walker
    • Log Maintenance

15. Disaster Recovery and Business Continuity

  • Disaster Types
  • Disaster Recovery Plan (DRP)
  • DRP Goals
  • Creating a DRP
  • DRP Contents
  • DRP Design Requirements
  • DRP Priorities
  • Recovery Strategies
  • High Availability
  • Data Collection Documentation
  • DRP Testing
  • Business Continuity Planning
  • BCP Steps

16. Cyber Evolution

  • Cyber Forces
  • Cyber Terrorism
  • Cyber Security: Crime, War, or Fear Mongering?
  • Cyber Future 7 Compliance Initiatives
  • Cyber Defense in Depth
  • Education and Training

Hands-On Excercises

Lab 1: Lab Setup

  • Access the Virtual Lab Environment
  • Configure BackTrack and Redhat Security Spin
  • Rebuild Your Physical Computer

Lab 2: Understanding TCP/IP

  • Convert Binary to Decimal
  • Convert Decimal to Binary
  • Convert Hexadecimal to Decimal
  • Analyze Wireshark Traffic

Lab 3: Vulnerability Assessment

  • Use Nessus
  • Identify Coding Issues

Lab 4: Cyber Awareness

  • Identifying Social Engineering Attacks
  • Detect Phishing Using Internet-Based Tools

Lab 5: Cyber Scanning

  • Trace Domains and IP Addresses
  • Map Web Site Content with Teleport Pro
  • Use Cheops for Graphical Display of Network
  • Use GFI LanGuard
  • Scan Using Nmap
  • Scan Using Zenmap
  • Perform Banner Grabbing

Lab 6: Cyber Attacks and Passwords

  • Crack Passwords via the GUI
  • Crack Passwords via the CLI
  • Hide Files with NTFS

Lab 7: Cyber Attacks and Backdoors

  • Perform Netcat Banner Grabbing
  • Perform Netcat Shoveling
  • Use Netcat to Port Scan
  • Create and Detect a Trojan

Lab 8: Risk Assessment

  • Review Profile and Complete a Criticality Ranking
  • Complete a Criticality Review
  • Complete a Threat Profile
  • Evaluate the Support Policy and Cost

Lab 9: Security Policies

  • Review Security Policies
  • Develop an Incident Response Policy

Lab 10: Host Security

  • Use the RECUB Trojan
  • Identify the RECUB Service
  • Harden the System

Lab 11: Covert Communications

  • Hide Messages Using S-Tools
  • Use Spam Mimic

Lab 12: Authentication and Cryptography

  • Use Ettercap
  • Use Dsniff
  • Explore Cain and Abel

Lab 13: Snort IDS

  • Install Snort IDS
  • Configure Eagle X IDS
  • Configure Rule to Ignore Hosts in Snort

Lab 14: Forensic Analysis

  • Examine an IIS Event Log and Identify Common
  • Use CurrPorts to Identify Anomalies
  • Use Jotti for Forensic Analysis

Lab 15: Business Continuity Plan

  • Identify When a Disaster Has Occurred
  • Determine Key Assets
  • Identify Potential Controls

Dates, Locations and Registration

Prerequisites:

TCP/IP Networking

Follow-On Courses:

CISSP Certification

Related Courses:

Security+ Certification

Home

Training & Certification:
   w Call Center
   w IT Support Center
   w ITIL
   w Help Desk

   w Telecom

Call Center Operations
Technical Support
Call Center Technology
Online Support
Customer Satisfaction
Knock Your Socks Off
Help Desk Institute
Telecom Books
Communication Skills
Call Center Monitoring
Metrics / Benchmarking
CRM
Hiring & Retention
Outbound Telesales
Novelty Gifts & Humor
Half-Priced Books

Subject Index
Catalog Index

Shipping Options
About Us
Contact Us

Registration Fees

The per student registration fee for the hands-on classroom session is $3,295, and includes the seminar, course materials, and morning and afternoon refreshments.

Classoom training begins at 8:30 AM each day and concludes at 4:30 PM unless otherwise directed. Please arrive early on the first day to sign-in and meet fellow attendees. If you register less than one week in advance of a class, please bring your confirmation letter. Business casual attire is appropriate.

Register securely online with confidence or please call (708) 246-0320.

Seminar Schedule
Mar 2-6, 2015 San Jose, CA Santa Clara Offices
Mar 30-Apr 3, 2015 New York, NY New York Offices
Apr 6-10, 2015 Atlanta, GA Atlanta Offices
Apr 20-24, 2015 Boston, MA Microtek Boston
Apr 27-May 1, 2015 Chicago, IL Schaumburg Offices
Apr 27-May 1, 2015 Washington, DC Arlington Offices
May 4-8, 2015 Los Angeles, CA Microtek
June 1-5, 2015 San Jose, CA Santa Clara Offices
June 8-12, 2015 Morristown, NJ Morristown Offices
June 15-19, 2015 Raleigh, NC Cary Training Ctr
July 6-10, 2015 Atlanta, GA Atlanta Offices
July 20-24, 2015 Dallas, TX Irving Training Center
July 27-31, 2015 Washington, DC Arlington Offices
Aug 3-7, 2015 Chicago, IL Schaumburg Offices
Aug 10-14, 2015 New York, NY New York Offices
Sept 14-18, 2015 Houston, TX Houston Training Center
Sept 21-25, 2015 San Jose, CA Santa Clara Offices
Sept 28-Oct 1, 2015 Raleigh, NC Cary Training Ctr

More Training and Certification Courses


Terms & Conditions

Seminar provider is not responsible for losses due to cancellation. In all circumstances, seminar provider's liability shall be limited to fees received.

Seminar agenda and assigned instructors are subject to change.

Public Training Terms & Conditions

Payment is due prior to the seminar.

Public seminar cancellation policy.  Registrants may cancel up to fourteen days in advance of the seminar start date for a full refund, less administrative fees of $400.  Or, you may transfer your registration to another member of your company at no additional charge.  Registrants canceling within fourteen days of the seminar will receive training credit, less administrative fees of $400 toward any other Resource Center seminar.

In the unlikely event that a seminar must be cancelled by seminar provider due to unavoidable circumstances, you will be notified at least two weeks prior to the seminar date, and your payment will be refunded.  Seminar provider is not responsible for losses due to cancellation including losses on advanced purchase airfares.  We strongly recommend that attendees traveling by air to attend the seminar purchase only refundable tickets.Become a certified callcenter manager