Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
event
wp-types-group
research-article
testimonial
Filter by Categories
5G TECHNOLOGIES
a) Access Network
All Course Calendar
Archives
b) Core Network
BASIC TRAININGS FOR PROFESSIONALS
BUSINESS & PROJECT MANAGEMENT
Carrier Ethernet Program
CERTIFICATION PROGRAMMES
CYBERSECURITY TRAININGS
DATA ANALYTICS
Demo
FIBER OPTICS COMMUNICATIONS
Forms
INTERNET OF THINGS (IoT)
IP, ETHERNET, MPLS / TRAFFIC ENGINEERING
IPTV, OTT MEDIA TECHNOLOGIES
LTE / 4G TECHNOLOGIES
Member
NETWORK OPERATIONS & SUPPORT
NETWORK QoS & OPTIMIZATION
Old content from Joomla
SDN NFV / DATA CENTRE TECHNOLOGIES
SIP / IMS / ROAMING
Telefocal Certification Programmes
Testimonials
Training Course Calendar
Training Courses
TRANSMISSION TECHNOLOGIES

Cyber Fundamentals with Hands-On Labs

Share this page on:

Course Overview:

This course is designed to help those without prior Cyber Security knowledge or experience to understand the fundamentals of Cyber Security. The topics covered in this course include Cyber Security terminologies, the basics of computer networks, cryptographic principles, penetration testing, and more.

The course will enable participants to gain insights into the modern security environment, particularly the cyber threat landscape and attackers’ mentality.

Participants will be able to learn how attackers work, what tools they use and what vulnerabilities they target. The hands-on sessions aim to help participants better grasp the information even if they are new to some of the topics.

Workstations will be equipped with Wireshark.

Duration and Training Format:

Instructor-led Training
[Classroom: 5 days / LIVE Virtual: 40 hours]

Course Objectives:

This workshop aims at introducing penetration testing methods and principles for Sigtran/MAP-based signaling systems in mobile networks.

Participants will gain insights into the signaling protocol related network vulnerabilities by actively using the Kali-Linux pentesting tools, modified and extended for mobile networks environment.

Practical exercises and lecturer guided signaling trace analysis will provide a strong foundation for further studies in the field.

Who Should Attend?

High level Managers, Pre-sale Managers, IT Managers, QA and Technical Support.

Target Audience:

  • High-level Managers
  • Pre-sales Managers
  • IT Managers
  • QA and Technical Support Managers

Key Benefits:

For High-level Managers,

  • Lead and manage meetings related to Cyber Security threats
  • Conduct discussions regarding cyber risk management within the organization with IT personnel
  • Be able to recruit highly skilled Cyber Security personnel

For Pre-sales Managers,

  • Capture your customers’ needs and concerns regarding cybersecurity aspects of integrating your products into the customers infrastructure
  • Present and discuss the security aspects of proposed technological products and solutions with your customers
  • Interact with potential customer with knowledge and integrity regarding security aspects of products
  • Knowledge of the cyber security buzzwords and topics

For Technical Support Managers,

  • Communicate with confidence Cyber Security topics, terms, and concepts
  • Understand computer network basics and fundamental grasp of networking acronyms, including TCP/IP, IP, TCP, UDP, MAC, ARP, NAT, ICMP, and DNS
  • Discuss various security technologies related to products with customers

Course Outlines:

  • Introduction to Cyber Security
  • Basics of Networking
  • OSI Layer Model
  • The Physical Layer and Vulnerabilities
  • Data Link Layer (IEEE Ethernet) - the 2nd layer
  • The 3rd Layer and IP Vulnerabilities
  • The 4th Layer - Transportation Layers
  • Inspection and Interception Tool - Hands-on
  • Internetworking
  • Inspection and Interception Tool - Hands-on
  • Basics of Security Management
  • Applications Evolution and Security Issues
  • MiTM Challenge and Confidentiality Solutions
  • Virtual Machines
  • Virtual Machines - Hands-on
  • Kali Linux - Hands-on
  • Inspection and Interception Tool - Hands-on
  • Basic Linux Commands
  • Offensive Security: Kali Linux
  • Linux CLI - Hands-on
  • Network Scanning
  • NMAP - Hands-on
  • Maltego - Demo
  • OpenVAS for Vulnerabilities Scanning
  • OpenVAS - Demo
  • Firewall
  • IPTables Firewall
  • Firewall - Hands-on
  • Introduction to Cryptography
  • Symmetric Cryptography
  • Asymmetric Cryptography
  • Certificates and Authentication Process
  • Penetration Testing
  • Network Penetration - Demo
  • Wireless Network Penetration
  • Wireless Network Penetration - Demo
  • SQL Injection – Demo and Hands-on
  • Cyber Security in the Organization

 

Related Course Topics

5G Security Overview Duration and Training Format 2 days, Instructor-led Training   Introduction Full deployment of 5G will happen very soon, probably in 2020. Expectations are high, as are security concerns. Significantly more devices and increased use of ...
An Overview of Cyber Security Course Overview: This course is designed to provide experienced telecoms and computer network professionals with specialised cybersecurity skills, as it focuses on how end-to-end network protection can be optimised. Through this course, executives t...
Cyber Fundamentals Training with Hands-On Labs Course Overview: The main objectives of this course is to address some fundamentals of Cyber Security topics, and provide insights into the modern security environment. It seeks to explain the cyber threat landscape and attackers' mentality, inclu...
Internet of Things (IoT) Security Workshop Course Overview Internet of Things (IoT) is bringing the network to individuals’ daily lives and is extending its reach to cities, industries and more. With such influence, IoT Security is definitely a key concern for all IoT stakeholders which inc...
LTE Security Course Overview: This course is designed to help participants understand the various security issues surrounding LTE networks. Encryption algorithms used in LTE networks will be discussed in-depth to enhance participants’ understanding of encryptio...

Contact Us

  • This field is for validation purposes and should be left unchanged.
Telefocal Asia © All rights reserved.

Setup Menus in Admin Panel

Skip to toolbar