Register Now
Cyber Security -1 Defensive (CS – 1)
General Information
Description
Our first batch on “Cyber Security 1-Defensive” is all set to take off!! The Classes are scheduled to start from September 25th, 2017 (Monday).
Cyber Security skill-set has been high on demand in recent times in IT market and that incited us in organizing this course providing an opportunity to all IT professionals in our contacts aspiring to make a career move. This is potentially the most sought-after IT trade as a result of huge number of vacancies and limited availability of skilled professionals.
“The ISACA, a non-profit information security advocacy group, predicts there will be a global shortage of two million cyber security professionals by 2019. And for every ten cyber security job ads that appear on career sites, only seven people even click on one of the ads, let alone apply” – excerpt from a recent report.
About the MASTER
The trainer Mr. Kari, is a highly experienced Security Architect. He has over 17 years of industry experience in developing, designing and architecting systems and applications from security point of view. Mr. Kari has been teaching Security concepts for over 6 years and Application Security for more than 4 years with passion for Security. He has double Masters in Information Systems with more focus on “Data and Network Security”. Many professionals have been immensely benefitted from the mastery of the trade, Cyber Security from Mr. Kari.
Great, if you please share this information amongst your contacts to support this campaign so that, it reaches more professional beneficiaries. Thank you.
Course Description
This course will teach about core security principle, technology and protocols based on which more complex and robust systems can be built. It will help build understanding and knowledge of defensive security at application layer. The most interesting part of the course will be Cryptography, Public Private key system. These fundamentals will help you understand, how some of the modern authentication system works, how digital signature works, how Ransomeware works and how Cryptocurrency works.
This
training will also help developers, system administrators, network administrators and also will help seasoned security professionals. Wherever possible and if time permits, we will learn through demo starting from developing code to, deployment and execution.
Step |
Module |
1 | CS1- Defensive |
Prerequisite:
Couple of years of experience in web application development. Should be able to understand web tier and related high level technologies easily.
Course Deliverables
Classroom Training: The aim of this course is to teach defensive security mostly at application layer. Apart from core concepts, we will run practicals for most of concepts. Next, we will take the fundamental security concepts and solve real world security problems.
Lab: All labs will be using VMs.
MODULE TOPICS ( 100)
Heading |
Topics |
Module 1 (brush up) | TCP/IP stack and communication Web application System Architecture Application environment (Dev, QA, UAT, Prod) |
Module 2 (Cryptography) | Symmetric encryption Hash, HMAC Standards and tools Example and sample and demo using Java or .NET |
Module 3 (Public and Private key) | Math and asymmetric encryption PKI structure and logic Digital signing |
Module 4 (Security Protocols and standards) | SSL/TLS S/MIME PGP IPSec (different mode) |
Module 5 (authentication) | Basic Form based Network authentication (Kerberos) SSO (Interceptor pattern: SiteMinder, SPNEGO, OAuth) Federated Identity Demo using Java or .NET |
Module 6 (Application as service) |
SSDLC Security around web application Authentication Authorization Auditing Logging and alerting |
Module 7 (OWASP and common vulnerability) | OWASP top 10 Demo of vulnerability and how to fix it. Debugging and tracing security issues using WireShark and Fiddler |
Module 8 (Architecture, governance and compliance) | Standards NIST FFICE DFS Regulatory and Compliance Organizational structure |
Module 9 (Sample in lab assessment) | Security Assessment Sample Application Assessment Threat modeling Reporting |
Module 10 (Implementation sample and demos) | Module 2 Symmetric Cryptography: Example and sample and demo using Java or .NET Module 3 Asymmetric Cryptographic: Example and sample and demo using Java or .NET Module 4 Security standard implementation: Example and sample and demo using Java or .NET Module 5 Authentication: Example and sample and demo using Java or .NET (Kerberos, OAuth) Module 6 Web vulnerability: Using WebGoat from OWASP |
Frequently Asked Questions
REGISTRATION URL
Register Now
Start date: September 25th, 2017 (Monday).
Course Fee: $1499.
For more details,
Email at trainings@solwinsys.com
Phone: 215 395 6373