Network Security Training

In this course, participants will learn the fundamental principles of computer and network security by studying attacks on computer systems, network, and the Web.  Participants will learn how those attacks…

Created by

Stalwart Learning

Date & Time

Price

Duration

5 Days

Location

https://stalwartlearning.com

ENQUIRE NOW


Course Description

Overview of Network Security

  • In this course, participants will learn the fundamental principles of computer and network security by studying attacks on computer systems, network, and the Web. 
  • Participants will learn how those attacks work and how to prevent and detect them. 
  • The course emphasizes on practical’s and requires participants to conduct a series of lab exercises
  • Through these labs, students can enhance their understanding of the principles, and be able to apply those principles to solve real problems

Duration

5 Days

Prerequisite for Network Security

A basic understanding of Computer Security and Unix/Linux commands may be helpful but not compulsory for the training program.

Course Outline for Network Security

Introduction and Basics
  • Class Introduction (syllabus, policies, and projects)
  • An Overview of Computer Security
  • Course projects (labs)
  • Unix Security Basics
Software Security: Vulnerabilities, Attacks, and Countermeasures
  • Privileged programs (Set-UID programs) and vulnerabilities
  • Buffer Overflow vulnerability and attack
  • Return-to-libc attack
  • Race Condition vulnerability and attack
  • Format String vulnerability and attack
  • Input validation
  • Shellshock attack
Web Security: Vulnerabilities, Attacks, and Coutermeasures
  • Same Origin Policy
  • Cross-Site Scripting Attack
  • Cross-Site Request Forgerty Attack
  • SQL-Injection Attack
  • Click-Jacking Attack
  • Web Tracking
  • Web Proxy and Firewall
Smartphone Security
  • Access control in Android operating system
  • Rooting Android devices
  • Repackaging attacks
  • Attacks on apps
  • Whole-disk encryption
  • Hardware protection: TrustZone

ENQUIRE NOW