Network Security Training

  • In this course, participants will learn the fundamental principles of computer and network security by studying attacks on computer systems, network, and the Web. 
  • Participants will learn how those attacks work and how to prevent and detect them. 
  • The course emphasizes on practical’s and requires participants to conduct a series of lab exercises
  • Through these labs, students can enhance their understanding of the principles, and be able to apply those principles to solve real problems

5 Days

A basic understanding of Computer Security and Unix/Linux commands may be helpful but not compulsory for the training program.

  • Class Introduction (syllabus, policies, and projects)
  • An Overview of Computer Security
  • Course projects (labs)
  • Unix Security Basics
  • Privileged programs (Set-UID programs) and vulnerabilities
  • Buffer Overflow vulnerability and attack
  • Return-to-libc attack
  • Race Condition vulnerability and attack
  • Format String vulnerability and attack
  • Input validation
  • Shellshock attack
  • Same Origin Policy
  • Cross-Site Scripting Attack
  • Cross-Site Request Forgerty Attack
  • SQL-Injection Attack
  • Click-Jacking Attack
  • Web Tracking
  • Web Proxy and Firewall
  • Access control in Android operating system
  • Rooting Android devices
  • Repackaging attacks
  • Attacks on apps
  • Whole-disk encryption
  • Hardware protection: TrustZone