ABOUT THE PROGRAM
The course covers the following topics:
DON'T TOUCH THIS TAB
It’s important to improve the accordion’s behaviour
Network Technologies
- OSI and the TCP/IP protocol stack
- Physical Layer and
- Data-Link and Ethernet
- Frame switching and switches
- Network Layer, IPv4, VLSM, IPv6
- ARP and DHCP
- Routing protocols and routers
- ICMPv4 and ICMPv6
- Application Layer protocols: DNS, HTTP, SSH
- Introduction to cryptography and VPN’s
Microsoft Domain Technologies
- Windows client OS setup and configuration
- Windows server OS setup and configuration
- Active Directory setup and management
- Managing users and groups
- Managing processes and services
- Using Group Policy to control settings and security
- Windows Remoting
- Windows Infrastructure services (DNS, DHCP, File and printer sharing)
- Introduction to PowerShell
Linux
- Linux overview
- Setup Linux from scratch
- Working with files and directories
- Text processing
- Regular expressions
- Searching for files
- Linux networking
- Linux users and permissions
- Package management and code compilation
- Process Management
- Linux services (web server, database, dhcp, ssh)
Check Point
- Introduction to Check Point Technology
- Deployment Platforms
- Introduction to the Security Policy
- Monitoring Traffic and Connections
- Network Address Translation
- Using Smart Update
- User Management and Authentication
- Introduction to Check Point VPNs
Building Tools with Python
- Hello python
- Expressions, data types, variables, and simple logic
- Solving problems with python flow control, conditionals, and loops
- Text processing, handling strings, lists and regular expressions
- Functional programing, exception handling and better use of cmd interface
- Generating dictionaries and working with files
- Network programing` binding sockets, TCP and UDP clients and servers
- Your 1st network scanner; host scans, port scans and banner grabbing
- RAW traffic generation with scapy; ethernet, IP, ICMP, TCP and UDP
Introduction to cyber warfare
- Hello Cyber
- Offensive #1: DoS (denial of service)
- Offensive #2: Information gathering
- Offensive #3: Gaining privileges
- Offensive #4: Injecting code
- Offensive #5: binary exploitation
- Worst-case scenario?
- Targeted, multi-stage attack demonstration
- The Cyber Attack Lifecycle (aka Cyber Kill Chain or MITRE ATT&CK)
- Defense #1: blacklist known bad stuff
- Defense #2: whitelisting the good stuff
- Defense #3: strong authentication
- Defense #4: “housekeeping” and asset management
- Defense #5: behavioral security and anomaly detection
- Defense #6: the human factor
- LAB Project: defend a kingdom
- Closing thoughts
Don't touch this tab
ABOUT CYBERPRO
About CYBERPRO was founded in cooperation with international information security and instruction authorities who bring to Israel world-leading cyber training technologies and a learning experience of the highest standard available today.
The partners include the IITC group which has been training graduates for the high tech industry for over 20 years, and was selected as the training center for the Cisco Company in Israel.
CYBERPRO’s advanced, sought-after training courses in the areas of infrastructures, information security and cyber are world famous. These training courses were developed by some of the best cyber experts in the world, for international security organizations that emphasize the high training capabilities, the professional learning methods and the unique training and practice technologies. Our connection with international groups allows our students to be exposed to unique employment opportunities in Israel and abroad.
The training and learning tracks are all based much hands-on practice and preparation for the industry and profession requirements, so they include technological labs and practice sessions using one of the most advanced simulators in the world.
COURSE INFO
Target audience
- Individuals with sound logical reasoning skills
- Trainees motivated to pursue a career in the sector
Prerequisites
- User-level knowledge of computers and the Internet
- Strong analytical skills (logical reasoning, problem solving)
- Advanced level of English
- Strong academic ability
- Commitment to further study/practice outside the classroom
- Prior experience of programming and managing Microsoft and/or communication networks is advantageous
Skills Gained
- Managing Microsoft based network
- Basic Networking
- Basic Linux administration
- Familiarity with Firewalls management
- Understanding the common attack vectors