1 / 21

Ofisgate Corporate

Ofisgate Corporate. Ofisgate Training Program. L e a d i n g I C T s o l u t i o n c o m p a n y. Headquarters: Ofisgate S dn Bhd (610820-A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, Malaysia. Regional Office:

alagan
Download Presentation

Ofisgate Corporate

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Ofisgate Corporate Ofisgate Training Program L e a d i n g I C T s o l u t i o n c o m p a n y Headquarters: Ofisgate Sdn Bhd (610820-A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, Malaysia Regional Office: Ofisgate (s) Pte Ltd, 205B Thompson Road, Goldhill Centre, Singapore www.ofisgate.com

  2. Introduction • Ofisgate offers a variety of training solutions for Network Administrator, IT support, Application Developer, IT managers, Security Officers and Professionals. • We believe training should be: • Customized.Innovative.Effective.Collaborative.Interactive. • Ofisgate Training Solutions : • Hands-On Training • 3 Days Hands-On Network Forensics Training • 3 Days Hands-On Network Security and Penetration Test Training • 3 Days Hands-On QualNet Simulation Training • 2 Days Hands-On IPV6 Training • 1 day Seminars & Hands- On Workshops ( Open participant) • Network Forensics a Hands-On • Workshop using Open Source www.ofisgate.com

  3. Training Program www.ofisgate.com

  4. Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Training Summary This course gives an advanced look at the TCP/IP architecture – its protocols and message formats - that will be useful to the network diagnostician. The course will examine many of the popular tools and applications, both open and commercial, which are available to assist in problem determination on today’s most popular implementations. The course will also provide a problem determination methodology useful in addressing future network problem scenarios. This class will have numerous hands-on labs designed to illustrate typical IP scenarios on popular platforms. Specifics of these labs should be customized with the course director. www.ofisgate.com

  5. Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. Audience Network Administrator, IT Support , Application Developer and IT Managers Duration 3 Days Classroom Approach This class is taught by lecture with hands-on training www.ofisgate.com

  6. Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. Course Content • MODULE 1 : An Introduction to Network Forensics • OSI Layer • Packet Analysis using Network Analyzers • MODULE 2 : Essentials for Network Forensics • Overview • How Network Forensics work • Types of Analysis • Troubleshooting Methodology • Analyzer / Tools Placement • Hands-On : Placement of Wireshark inside the network and start capture • MODULE 3: Navigating the Wireshark Overview • Start Page • Menu Options • Moving Around in the application • Graphing • Base Lining www.ofisgate.com

  7. Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. Course Content • MODULE 4 : Capturing Data and Filtering • What to capture, and where • Capture Challenges • Capture option Window • MODULE 5 : Filtering • Filtering Overview • Types of Filters • Basic & Advanced Filtering • Hands-On : Network Troubleshooting • MODULE 6 : Application Analysis and Performance • What is application Analysis ? • Correlating events with conversations • Troubleshooting common application problem • Expert tuning methodology • Hands-On : Application Performance Analysis www.ofisgate.com

  8. Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. • MODULE 7 : Security Analysis • Legacy servers and application, older network devices • Analyzing malware behavior • Hands-On : Sniffing User ID and password over the network End www.ofisgate.com

  9. Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Course Description The goal of the ethical hacking and countermeasures program is to help the organization take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival. Summary This course consists of the following modules - Ethics and Legal Issues, Foot printing, Scanning, Enumeration, System Hacking, Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking, Hacking Web Servers, Web Application Vulnerabilities, Web Based Password Cracking Techniques, SQL Injection, Hacking Wireless Networks, Virus and Worms, Physical Security, Hacking Linux, IDS, Firewalls and Honeypots, Buffer Overflows, Cryptography, Penetration Testing Methodologies www.ofisgate.com

  10. Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Audience Security Officers, Auditors, Security Professionals, Site Administrators, Anyone who is concerned about the integrity of the network infrastructure Duration 3 Days Classroom Approach This class is taught by lecture with hands-on training www.ofisgate.com

  11. Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content • MODULE 1 : An Introduction to Penetration Testing • What is Penetration Testing ? (Blackbox vs Whitebox Testing) • What are the responsibilities for a Penetration Tester ? • An Overview of the Open-Source Security Testing Methodology Manual • Methodology for Penetration Testing • Penetration Testing Options • Vulnerability Result Report Writing • Understanding Hackers • What Hackers Do – Hackers / Administrators View • Who are Hackers • Categorizing Hackers • Attack Categories • Intrusion Methods • The Security Process and The CIA Model • Threat Analysis www.ofisgate.com

  12. Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content • MODULE 2 : Active-Passive Reconnaissance Techniques • Planning and starting the test • Information Gathering & Footprinting • Passive Information Gathering • Advanced Search Techniques (Spam DBs, P2P networks) • Whois Search • Active Information Gathering • Using Information Gathering Tools ( tracert, nslookup,zone transfer) • Gathering Tools ( tracert, nslookup,zone transfer) • Hands- On Session (Scanning & Fingerprint) • Port Scanning Technique (using port scanning tools) • An introduction to hping • What is hping • How do you use hping • Advance hping usage • OS Fingerprinting- how does it work? • OS Fingerprint Tools Service Probing • Hands-On Session www.ofisgate.com

  13. Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content • MODULE 3 : Vulnerability Assessment • Understanding Vulnerabilities • Types of Vulnerability • Technique for Finding Vulnerability • Automated vulnerability Scanning Tools • Open Source vulnerability scanners • Commercial vulnerability Scanners • Nessus 4 • Microsoft MBSA • Sysinternals Tools • Hands-on Session • MODULE 4 : Hacking • Windows Architecture Overview • Vulnerabilities & attacks • Remote password guessing • Tapping the wire • Password cracking • Password sniffers • Hiding Files • Buffer overflows • Hands-On session www.ofisgate.com

  14. Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content • MODULE 5 : Attacking Web Technologies • Web Server Assessment Overview • Introduction to Web Servers • Web Server Market • Popular Web Servers and common Vulnerabilities • Tools used in attacking web servers • Web server Countermeasures • Web application Penetration methodologies • Understanding Web application Security • Common Web application Security Vulnerabilities • Input Manipulation • Authentication and Session Management • Web Application Countermeasures • Password Cracking Techniques www.ofisgate.com

  15. Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content • MODULE 6 : Wireless Hacking • 802.11 Architecture • Wireless Authentication • 802.1x standard • Attack Vectors • Wireless Hacking using Backtrack 5 • Wireless Attack Countermeasures • Hands-On Session www.ofisgate.com

  16. Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Additional Modules Some or all of the following topics are covered in the regular outline above. However, if the class is running ahead of schedule they will be covered in more detail as follows. • Social Engineering • What is social engineering ? • The art of deception • Human Weakness • Dumpster Diving • Shoulder Surfing • Mail attachments • Phishing websites • Countermeasures • TCP /IP Refresher • TCP/IP Basics • The OSI Model • TCP vs UDP • TCP Internals- an introduction to TCP headers • MTU & TTL • ARP & MAC Addresses • Error Control • Fragmentation • NAT • Routing • Recommendation for further reading (TCP /IP Illustrated Vol.1 etc.) • References • Denial of Service • What is denial of service? • What is the point of DoS? • What is DDoS ? • What is DRDoS ? • How DDoS can effect a company financially www.ofisgate.com

  17. Hands-On Training QUALNET SIMULATION TRAINING • Summary • SCALABLE Training Workshops teach new QualNet® software users to become proficient with the tools quickly. • A SCALABLE Training Workshop is a 3-day course that gets progressively more advanced. • Day 1 provides an introduction to the QualNet graphical user interface and networking concepts in the framework of QualNet models • Day 2 features advanced simulation concepts • Day 3 covers more advanced topics, such as building simple protocols in designer Duration 3 Days Classroom Approach This class is taught by lecture with hands-on training www.ofisgate.com

  18. Hands-On Training QUALNET SIMULATION TRAINING Cont… Course Content • Software Installation • License Server Installation • Related Issues Day 1 • Introduction to QualNet • Module 1 : Qualnet Installation (Lecture & Hands-On) • Module 2 : Qualnet IDE Functional Overview (Lecture) • Module 2 : Qualnet IDE Functional Overview (Hands-On) • Module 3 : Basic Wired & Wireless (Lecture) • Module 3 : Basic Wired & Wireless (Hands-On) Day 2 • Advanced QualNet • Module 4 : Advanced Wired & Wireless (Lecture & Hands-On) • Module 4 : Advanced Wired & Wireless (Lecture & Hands-On) • Module 5 : Common Line (Lecture & Hands-On) • Module 6 : QualNet Achitecture, Code Modification Guidelines, Emulation • Guidelines Day 3 www.ofisgate.com

  19. Hands-On Training HANDS-ON INTERNET PROTOCOL VERSION 6 (IPV6) LEVE L 1 TRAINING Course Description The CNE6 courses are intended for network and system engineers who need to understand the new features and operational characteristics of network based on IPv6. The Level 1(Silver) course introduces participants to the basic concept of IPv6 and how these dier from IPv4, related protocols, and the  various transition mechanisms and help add support for IPv6 into existing networks. Audience Network engineers, managers, and anyone interested in IPv6 deployment. The hands-On session and demos would be particularly important for operational engineers, while the more general discussion and review of issues involved would be highly relevant to managers and other decision makers. Duration 2 Days Classroom Approach This class is taught by lecture with hands-on training www.ofisgate.com

  20. Hands-On Training HANDS-ON INTERNET PROTOCOL VERSION 6 (IPV6) LEVEL 1TRAINING Cont.. Course Content • MODULE 1 : An Introduction to IPV6 • Refresher on IP Addressing • IP Address Management • Issues with IPV4 • IPV6 , Solution to IPV6 Depletion • Features of IPV6 • IPV6 DNS • Benefits of IPV6 • What’s Next ? MODULE 2 : Addressing Architecture MODULE 3 : Packet Structure and Header Formats MODULE 4 : Header Extensions MODULE 5 : ICMPv6 & Neighbor Discovery (ND) MODULE 6 : TRANSITION MECHANISMS : Dual Stack, tunneling and translation www.ofisgate.com

  21. Thank You For enquiries about our products, services or to schedule a sales presentation: • e: sales_enquiries@ofisgate.com • For contact information: • OFISGATE SDN BHD (610820-A)2-15, Jalan Jalil Perkasa 13,Aked Esplanad, Bukit Jalil,57000 Kuala Lumpur, MALAYSIA. Tel: +603 8994 0778 Fax: +603 8994 0779 www.ofisgate.com

More Related