Integrated Cyber Security and Cyber Forensic Training


Linux Training + Windows Basics Training+ Linux Hardening Training + Cyber Security Training

This Training Module is for those who is highly Interested and ready to make his/her career in   cyber Security and Ethical Hacking Field with indepth Knowledge.

PHASE 1: Linux Training with Cyber Security Lab setup

PHASE 2: Windows OS Basic training(Specially security Options)

PHASE 3: Linux Server Hardening Training

PHASE 4: Cyber Security and Cyber Security Training With Cryptography as mentioned below.

 

1. Viruses Detection and prevention
2. Crypto-malware and malware detection
3. Ransomware attack Concept and Prevention
4. Learn about Worm
5. Trojan symptoms and awareness
6. Rootkit scanning and configuration
7. Keylogger
8. Adware and it’s effect
9. Spyware and it’s dangerous effect
10. Bots
11. RAT
12. Logic bomb
13. Backdoor created by Hackers

Compare and contrast types of attacks.

1. Social engineering attack
Phishing attack
Spear phishing attack
Shoulder surfing

Principles (reasons for effectiveness)

2. Application/service attacks
DoS attack live demonstaration
DDoS attack and it’s functionality
Man-in-the-middle attack

Injection

Privilege escalation
ARP poisoning
DNS poisoning
Domain hijacking
Man-in-the-browser and security

MAC spoofing
IP spoofing

 

 Cryptographic attacks:
Birthday
Known plain text/cipher text
create Dictionary

Dictionary attack
Brute force
Online vs. offline
Collision
Downgrade

 

Weak implementations

 

Attributes of hackers
Internal/external
Level of sophistication
Resources/funding
Intent/motivation

Use of open-source intelligence

 

Penetration testing vs. vulnerability scanning

Explain the impact associated with types of vulnerabilities.

1. Race conditions

2. Vulnerabilities Reasons and Types:

End-of-life systems
Embedded systems
Lack of vendor support
3. Improper input handling
4. Improper error handling
5. weak configuration
6. Default configuration
7. Resource exhaustion
8. Untrained users
9. Improperly configured accounts
10. Vulnerable business processes
11. Weak cipher suites and implementations
12. Memory/buffer vulnerability

13. System sprawl/undocumented assets
14. Architecture/design weaknesses
15. New threats/zero day
16. Improper certificate and key management

 

Install and configure network components, both hardware and software-based, to support organizational security.
Firewall
ACL
Application-based vs. network-based
Stateful vs. stateless

Proxy
proxy server
Chainproxy
Virtual server
Application/multipurpose

Access point
SSID
MAC filtering
Signal strength
Band selection/width
Antenna types and placement
Fat vs. thin

USB blocking

Given a scenario, use appropriate software tools to assess the security posture of an organization.

1. Protocol analyzer
2. Network scanners

Rogue system detection
Network mapping
3. Wireless scanners/cracker
4. Password cracker for Windows/Linux
5. Vulnerability scanner
6. Configuration compliance scanner
7. Exploitation frameworks
8. Data  tools
9. Stenography tools
10. Honeypot
11. Backup utilities
12. Banner grabbing
13. Passive vs. active
14. Command line tools

ping
netstat
tracert
nslookup/dig
arp
ipconfig/ip/ifconfig
tcpdump
nmap
netcat

Given a scenario, troubleshoot common security issues.

1. Unencrypted credentials/clear text
2. Logs and events anomalies
3. Permission issues
4. Access violations
5. Certificate issues
6. Data exfiltration
7. Misconfigured devices
8. Weak security configurations
9. Personnel issues

Policy violation
Insider threat
Social engineering
Social media
Personal email

10. Unauthorized software
11. Baseline deviation
12. License compliance violation (availability/integrity)
13. Asset management
14. Authentication issues

Given a scenario, analyze and interpret output from security technologies.

1. HIDS/HIPS
2. Antivirus
3. File integrity check
4. Host-based firewall
5. Application whitelisting
6. Removable media control
7. Advanced malware tools
8. Patch management tools
9. UTM
10. DLP
11. Data execution prevention
12. Web application firewall

Given a scenario, deploy mobile devices securely.
Connection methods
Cellular
WiFi
Bluetooth
NFC
USB

Mobile device management concepts

Application management
Content management
Remote wipe
Geo fencing
Geo location

Screen locks
Push notification services
Passwords and pins
Bio metrics
Context-aware authentication
Containerization
Storage segmentation
Full device encryption

Use cases

Voice and video
Time synchronization
Email and web
File transfer
Directory services
Remote access
Domain name resolution
Routing and switching
Network address allocation
Subscription service

Architecture and Design

Explain use cases and purpose for frameworks,
best practices and secure configuration guides.
1. Industry-standard frameworks and reference architectures
Regulatory
Non-regulatory
National vs. international
Industry-specific frameworks

Benchmarks/secure configuration guides

Platform/vendor-specific guides
Web server
Operating system
Application server
Network infrastructure devices
General purpose guides

Defense-in-depth/layered security

Vendor diversity
Control diversity
Administrative
Technical
User training

Given a scenario, implement secure network architecture concepts.

Zones/topologies
DMZ
Extranet
Intranet
Wireless
Guest
Honeynets
NAT

Operating systems

Types
Network
Server
Workstation
Appliance
Mobile OS
Patch management
Disabling unnecessary ports and services
Least functionality
Secure configurations
Trusted operating system
Application whitelisting/blacklisting
Disable default accounts/passwords

Peripherals

Wireless keyboards
Wireless mice
Displays
WiFi-enabled MicroSD cards
Printers/MFDs
External storage devices
Digital cameras

Explain the importance of secure staging deployment concepts.

1. Sandboxing
2. Environment
Development
Test
Staging
Production
3. Secure baseline
Integrity measurement

Summarize secure application development and deployment concepts.

Development life-cycle models
Waterfall vs. Agile
Proper error handling
Proper input validation
Normalization
Stored procedures
Code signing
Encryption
Obfuscation/camouflage
Code reuse/dead code
Server-side vs. client-side execution and validation
Memory management
Use of third-party libraries and SDKs
Data exposure

. Code quality and testing

Static code analyzers
Dynamic analysis (e.g., fuzzing)
Stress testing
Sandboxing
Model verification

 Compiled vs. runtime code

Summarize cloud and virtualization concepts.

1. Hypervisor

2. Cloud storage
3. Cloud deployment models

SaaS
PaaS
IaaS
Private
Public
Hybrid
Community
6. On-premise vs. hosted vs. cloud
7. VDI/VDE
8. Cloud access security broker
9. Security as a Service

Snapshots
Revert to known state
Rollback to known configuration
Live boot media
Elasticity
Scalability
Distributive allocation
Redundancy
Fault tolerance
High availability
RAID

 

Explain the importance of physical security controls.

1. Lighting
2. Signs
3. Fencing/gate/cage
4. Security guards
5. Alarms
6. Safe
7. Secure cabinets/enclosures
8. Protected distribution/Protected cabling
9. Airgap
10. Mantrap
11. Faraday cage
12. Lock types
13. Biometrics
14. Barricades/bollards
15. Tokens/cards
16. Environmental controls

Hot and cold aisles
Fire suppression
17. Cable locks
18. Screen filters
19. Cameras
20. Motion detection
21. Logs
22. Infrared detection
23. Key management

. Biometric factors

Fingerprint scanner
Retinal scanner
Iris scanner
Voice recognition
Facial recognition
False acceptance rate
False rejection rate
Crossover error rate

File system security

Database security

Given a scenario, differentiate common account management practices

Account types

User account
Shared and generic accounts/credentials
Guest accounts
Service accounts
Privileged accounts

General Concepts

Least privilege
Onboarding/offboarding
Permission auditing and review
Usage auditing and review
Time-of-day restrictions
Recertification
Standard naming convention
Account maintenance
Group-based access control
Location-based policies

Account policy enforcement

Credential management
Group policy
Password complexity
Expiration
Recovery
Disablement
Lockout
Password history
Password reuse
Password length

Risk Management

Mandatory vacations
Job rotation
Separation of duties
Clean desk
Background checks
Exit interviews
Role-based awareness training
Data owner
System administrator
System owner
User
Privileged user
Executive user
NDA
Onboarding
Continuing education
Acceptable use policy/rules of behavior

 

Explain risk management processes and concepts.
1. Threat assessment
Environmental
Manmade

Internal vs. external

2. Risk assessment

Asset value
Risk register
Likelihood of occurrence
Supply chain assessment
Impact
Quantitative
Qualitative
Testing
Penetration testing authorization
Vulnerability testing authorization
Risk response techniques
Accept
Transfer
Avoid
Mitigate

Change management

Given a scenario, follow incident response procedures

Incident response plan
Documented incident types/category definitions
Roles and responsibilities
Reporting requirements/escalation
Cyber-incident response teams

Incident response process

Preparation
Identification
Containment
Eradication
Recovery
Lessons learned

Summarize basic concepts of forensics.

1. Order of volatility
2. Chain of custody
3. Legal hold
4. Data acquisition
Capture system image
Network traffic and logs
Capture video
Record time offset
Take hashes
Screenshots

Witness interviews

Active logging

Explain disaster recovery and continuity of operation concepts.

1. Recovery sites
Hot site
Warm site
Cold site

2. Order of restoration
3. Backup concepts

Differential
Incremental
Snapshots
Full

Geographic considerations(Cloud Computing Security)

Off-site backups
Distance
Location selection
Legal implications
Data sovereignty

Given a scenario, carry out data security and privacy practices.

1. Data destruction and media sanitization

Burning
Shredding
Pulping
Pulverizing
Degaussing
Purging
Wiping

Cryptography and PKI

Compare and contrast basic concepts of cryptography.
1. Symmetric algorithms
2. Modes of operation
3. Asymmetric algorithms
4. Hashing
5. Salt, IV, nonce
6. Elliptic curve
7. Weak/deprecated algorithms
8. Key exchange
9. Digital signatures
10. Diffusion
11. Confusion
12. Collision
13. Steganography
14. Obfuscation
15. Stream vs. block
16. Key strength
17. Session keys
18. Ephemeral key
19. Secret algorithm
20. Data-in-transit
21. Data-at-rest
22. Data-in-use
23. Random/pseudo-random number generation
24. Key stretching
25. Implementation vs. algorithm selection
Crypto service provider
Crypto modules
26. Perfect forward secrecy
27. Security through obscurity
28. Common use cases

Explain cryptography algorithms and their basic characteristics.

1. Symmetric algorithms
AES
DES
3DES
RC4
Blowfish/Twofish

Stream vs. block

3. Asymmetric algorithms

RSA
DSA
PGP/GPG

4. Hashing algorithms

MD5
SHA

5. Certificate formats

DER
PEM
PFX
CER
P12
P7B

Advertisement