Presentation is loading. Please wait.

Presentation is loading. Please wait.

Ofisgate Training Program Headquarters: Ofisgate Sdn Bhd (610820-A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, Malaysia.

Similar presentations


Presentation on theme: "Ofisgate Training Program Headquarters: Ofisgate Sdn Bhd (610820-A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, Malaysia."— Presentation transcript:

1 Ofisgate Training Program Headquarters: Ofisgate Sdn Bhd ( A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, Kuala Lumpur, Malaysia Regional Office: Ofisgate (s) Pte Ltd, 205B Thompson Road, Goldhill Centre, Singapore

2 Introduction Ofisgate offers a variety of training solutions for Network Administrator, IT support, Application Developer, IT managers, Security Officers and Professionals. We believe training should be: Customized.Innovative.Effective.Collaborative.Interactive. Ofisgate Training Solutions : Hands-On Training  3 Days Hands-On Network Forensics Training  3 Days Hands-On Network Security and Penetration Test Training  3 Days Hands-On QualNet Simulation Training  2 Days Hands-On IPV6 Training 1 day Seminars & Hands- On Workshops ( Open participant)  Network Forensics a Hands-On Workshop using Open Source

3 Training Program

4 Hands-On Training Training Summary This course gives an advanced look at the TCP/IP architecture – its protocols and message formats - that will be useful to the network diagnostician. The course will examine many of the popular tools and applications, both open and commercial, which are available to assist in problem determination on today’s most popular implementations. The course will also provide a problem determination methodology useful in addressing future network problem scenarios. This class will have numerous hands-on labs designed to illustrate typical IP scenarios on popular platforms. Specifics of these labs should be customized with the course director. HANDS-ON NETWORK FORENSICS TRAINING

5 Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. Audience Network Administrator, IT Support, Application Developer and IT Managers Duration 3 Days Classroom Approach This class is taught by lecture with hands-on training

6 Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. Course Content MODULE 1 : An Introduction to Network Forensics OSI Layer Packet Analysis using Network Analyzers MODULE 1 : An Introduction to Network Forensics OSI Layer Packet Analysis using Network Analyzers MODULE 2 : Essentials for Network Forensics Overview How Network Forensics work Types of Analysis Troubleshooting Methodology Analyzer / Tools Placement Hands-On : Placement of Wireshark inside the network and start capture MODULE 2 : Essentials for Network Forensics Overview How Network Forensics work Types of Analysis Troubleshooting Methodology Analyzer / Tools Placement Hands-On : Placement of Wireshark inside the network and start capture MODULE 3: Navigating the Wireshark Overview Start Page Menu Options Moving Around in the application Graphing Base Lining MODULE 3: Navigating the Wireshark Overview Start Page Menu Options Moving Around in the application Graphing Base Lining

7 Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. Course Content MODULE 4 : Capturing Data and Filtering What to capture, and where Capture Challenges Capture option Window MODULE 4 : Capturing Data and Filtering What to capture, and where Capture Challenges Capture option Window MODULE 5 : Filtering Filtering Overview Types of Filters Basic & Advanced Filtering Hands-On : Network Troubleshooting MODULE 5 : Filtering Filtering Overview Types of Filters Basic & Advanced Filtering Hands-On : Network Troubleshooting MODULE 6 : Application Analysis and Performance What is application Analysis ? Correlating events with conversations Troubleshooting common application problem Expert tuning methodology Hands-On : Application Performance Analysis MODULE 6 : Application Analysis and Performance What is application Analysis ? Correlating events with conversations Troubleshooting common application problem Expert tuning methodology Hands-On : Application Performance Analysis

8 Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. MODULE 7 : Security Analysis Legacy servers and application, older network devices Analyzing malware behavior Hands-On : Sniffing User ID and password over the network MODULE 7 : Security Analysis Legacy servers and application, older network devices Analyzing malware behavior Hands-On : Sniffing User ID and password over the network End

9 Hands-On Training Course Description The goal of the ethical hacking and countermeasures program is to help the organization take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival. HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Summary This course consists of the following modules - Ethics and Legal Issues, Foot printing, Scanning, Enumeration, System Hacking, Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking, Hacking Web Servers, Web Application Vulnerabilities, Web Based Password Cracking Techniques, SQL Injection, Hacking Wireless Networks, Virus and Worms, Physical Security, Hacking Linux, IDS, Firewalls and Honeypots, Buffer Overflows, Cryptography, Penetration Testing Methodologies

10 Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Audience Security Officers, Auditors, Security Professionals, Site Administrators, Anyone who is concerned about the integrity of the network infrastructure Duration 3 Days Classroom Approach This class is taught by lecture with hands-on training

11 Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 1 : An Introduction to Penetration Testing What is Penetration Testing ? (Blackbox vs Whitebox Testing) What are the responsibilities for a Penetration Tester ? An Overview of the Open-Source Security Testing Methodology Manual Methodology for Penetration Testing Penetration Testing Options Vulnerability Result Report Writing Understanding Hackers What Hackers Do – Hackers / Administrators View Who are Hackers Categorizing Hackers Attack Categories Intrusion Methods The Security Process and The CIA Model Threat Analysis MODULE 1 : An Introduction to Penetration Testing What is Penetration Testing ? (Blackbox vs Whitebox Testing) What are the responsibilities for a Penetration Tester ? An Overview of the Open-Source Security Testing Methodology Manual Methodology for Penetration Testing Penetration Testing Options Vulnerability Result Report Writing Understanding Hackers What Hackers Do – Hackers / Administrators View Who are Hackers Categorizing Hackers Attack Categories Intrusion Methods The Security Process and The CIA Model Threat Analysis

12 Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 2 : Active-Passive Reconnaissance Techniques Planning and starting the test Information Gathering & Footprinting Passive Information Gathering Advanced Search Techniques (Spam DBs, P2P networks) Whois Search Active Information Gathering Using Information Gathering Tools ( tracert, nslookup,zone transfer) Gathering Tools ( tracert, nslookup,zone transfer) Hands- On Session (Scanning & Fingerprint) Port Scanning Technique (using port scanning tools) An introduction to hping What is hping How do you use hping Advance hping usage OS Fingerprinting- how does it work? OS Fingerprint Tools Service Probing Hands-On Session MODULE 2 : Active-Passive Reconnaissance Techniques Planning and starting the test Information Gathering & Footprinting Passive Information Gathering Advanced Search Techniques (Spam DBs, P2P networks) Whois Search Active Information Gathering Using Information Gathering Tools ( tracert, nslookup,zone transfer) Gathering Tools ( tracert, nslookup,zone transfer) Hands- On Session (Scanning & Fingerprint) Port Scanning Technique (using port scanning tools) An introduction to hping What is hping How do you use hping Advance hping usage OS Fingerprinting- how does it work? OS Fingerprint Tools Service Probing Hands-On Session

13 Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 3 : Vulnerability Assessment Understanding Vulnerabilities Types of Vulnerability Technique for Finding Vulnerability Automated vulnerability Scanning Tools Open Source vulnerability scanners Commercial vulnerability Scanners Nessus 4 Microsoft MBSA Sysinternals Tools Hands-on Session MODULE 3 : Vulnerability Assessment Understanding Vulnerabilities Types of Vulnerability Technique for Finding Vulnerability Automated vulnerability Scanning Tools Open Source vulnerability scanners Commercial vulnerability Scanners Nessus 4 Microsoft MBSA Sysinternals Tools Hands-on Session MODULE 4 : Hacking Windows Architecture Overview Vulnerabilities & attacks Remote password guessing Tapping the wire Password cracking Password sniffers Hiding Files Buffer overflows Hands-On session MODULE 4 : Hacking Windows Architecture Overview Vulnerabilities & attacks Remote password guessing Tapping the wire Password cracking Password sniffers Hiding Files Buffer overflows Hands-On session

14 Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 5 : Attacking Web Technologies Web Server Assessment Overview Introduction to Web Servers Web Server Market Popular Web Servers and common Vulnerabilities Tools used in attacking web servers Web server Countermeasures Web application Penetration methodologies Understanding Web application Security Common Web application Security Vulnerabilities Input Manipulation Authentication and Session Management Web Application Countermeasures Password Cracking Techniques MODULE 5 : Attacking Web Technologies Web Server Assessment Overview Introduction to Web Servers Web Server Market Popular Web Servers and common Vulnerabilities Tools used in attacking web servers Web server Countermeasures Web application Penetration methodologies Understanding Web application Security Common Web application Security Vulnerabilities Input Manipulation Authentication and Session Management Web Application Countermeasures Password Cracking Techniques

15 Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 6 : Wireless Hacking Architecture Wireless Authentication 802.1x standard Attack Vectors Wireless Hacking using Backtrack 5 Wireless Attack Countermeasures Hands-On Session MODULE 6 : Wireless Hacking Architecture Wireless Authentication 802.1x standard Attack Vectors Wireless Hacking using Backtrack 5 Wireless Attack Countermeasures Hands-On Session

16 Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Additional Modules Some or all of the following topics are covered in the regular outline above. However, if the class is running ahead of schedule they will be covered in more detail as follows. TCP /IP Refresher TCP/IP Basics The OSI Model TCP vs UDP TCP Internals- an introduction to TCP headers MTU & TTL ARP & MAC Addresses Error Control Fragmentation NAT Routing Recommendation for further reading (TCP /IP Illustrated Vol.1 etc.) References Social Engineering What is social engineering ? The art of deception Human Weakness Dumpster Diving Shoulder Surfing Mail attachments Phishing websites Countermeasures Denial of Service What is denial of service ? What is the point of DoS ? What is DDoS ? What is DRDoS ? How DDoS can effect a company financially

17 Hands-On Training QUALNET SIMULATION TRAINING Summary SCALABLE Training Workshops teach new QualNet ® software users to become proficient with the tools quickly. A SCALABLE Training Workshop is a 3-day course that gets progressively more advanced. Day 1 provides an introduction to the QualNet graphical user interface and networking concepts in the framework of QualNet models Day 2 features advanced simulation concepts Day 3 covers more advanced topics, such as building simple protocols in designer Duration 3 Days Classroom Approach This class is taught by lecture with hands-on training

18 Hands-On Training QUALNET SIMULATION TRAINING Cont… Course Content Software Installation License Server Installation Related Issues Software Installation License Server Installation Related Issues Introduction to QualNet Module 1 : Qualnet Installation (Lecture & Hands-On) Module 2 : Qualnet IDE Functional Overview (Lecture) Module 2 : Qualnet IDE Functional Overview (Hands-On) Module 3 : Basic Wired & Wireless (Lecture) Module 3 : Basic Wired & Wireless (Hands-On) Introduction to QualNet Module 1 : Qualnet Installation (Lecture & Hands-On) Module 2 : Qualnet IDE Functional Overview (Lecture) Module 2 : Qualnet IDE Functional Overview (Hands-On) Module 3 : Basic Wired & Wireless (Lecture) Module 3 : Basic Wired & Wireless (Hands-On) Advanced QualNet Module 4 : Advanced Wired & Wireless (Lecture & Hands-On) Module 5 : Common Line (Lecture & Hands-On) Module 6 : QualNet Achitecture, Code Modification Guidelines, Emulation Guidelines Advanced QualNet Module 4 : Advanced Wired & Wireless (Lecture & Hands-On) Module 5 : Common Line (Lecture & Hands-On) Module 6 : QualNet Achitecture, Code Modification Guidelines, Emulation Guidelines Day 1 Day 2 Day 3

19 Hands-On Training Course Description The CNE6 courses are intended for network and system engineers who need to understand the new features and operational characteristics of network based on IPv6. The Level 1(Silver) course introduces participants to the basic concept of IPv6 and how these dier from IPv4, related protocols, and the various transition mechanisms and help add support for IPv6 into existing networks. HANDS-ON INTERNET PROTOCOL VERSION 6 (IPV6) LEVE L 1 TRAINING Duration 2 Days Classroom Approach This class is taught by lecture with hands-on training Audience Network engineers, managers, and anyone interested in IPv6 deployment. The hands-On session and demos would be particularly important for operational engineers, while the more general discussion and review of issues involved would be highly relevant to managers and other decision makers.

20 Hands-On Training HANDS-ON INTERNET PROTOCOL VERSION 6 (IPV6) LEVEL 1TRAINING Cont.. Course Content MODULE 1 : An Introduction to IPV6 Refresher on IP Addressing IP Address Management Issues with IPV4 IPV6, Solution to IPV6 Depletion Features of IPV6 IPV6 DNS Benefits of IPV6 What’s Next ? MODULE 1 : An Introduction to IPV6 Refresher on IP Addressing IP Address Management Issues with IPV4 IPV6, Solution to IPV6 Depletion Features of IPV6 IPV6 DNS Benefits of IPV6 What’s Next ? MODULE 2 : Addressing Architecture MODULE 2 : Addressing Architecture MODULE 3 : Packet Structure and Header Formats MODULE 3 : Packet Structure and Header Formats MODULE 4 : Header Extensions MODULE 4 : Header Extensions MODULE 5 : ICMPv6 & Neighbor Discovery (ND) MODULE 5 : ICMPv6 & Neighbor Discovery (ND) MODULE 6 : TRANSITION MECHANISMS : Dual Stack, tunneling and translation MODULE 6 : TRANSITION MECHANISMS : Dual Stack, tunneling and translation

21 e: For contact information: OFISGATE SDN BHD ( A) 2-15, Jalan Jalil Perkasa 13, Aked Esplanad, Bukit Jalil, Kuala Lumpur, MALAYSIA. Tel: Fax: For enquiries about our products, services or to schedule a sales presentation:


Download ppt "Ofisgate Training Program Headquarters: Ofisgate Sdn Bhd (610820-A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, Malaysia."

Similar presentations


Ads by Google