8
CAST 614 910 OMR PRICE ADVANCED NETWORK DEFENSE 27TH - 29TH OCTOBER 2014 e course will cover fundamental areas of fortifying your defenses; you will discover methods of developing a secure baseline and how to “harden” your enterprise architectures from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of “live” memory analysis and real time monitoring. Come experience a comprehensively structured and fast paced program that immerses you into the mysterious world of the “hacker”, providing insights of their mindset; a critical weapon for defending against some of the most malicious attacks around. by Kevin Cardwell www.rikazglobal.wordpress.com

CAST 614 - rikazglobal.files.wordpress.com · • Intrusion Detection 101 • Advanced Filtering Techniques • Firewall Types: ... • Upon completion of the course, each participants

  • Upload
    others

  • View
    5

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CAST 614 - rikazglobal.files.wordpress.com · • Intrusion Detection 101 • Advanced Filtering Techniques • Firewall Types: ... • Upon completion of the course, each participants

CAST 614

910OM

R

PRICE

ADVANCED NETWORK DEFENSE

27TH - 29THOCTOBER

2014

The course will cover fundamental areas of fortifying your defenses; you will discover methods of developing a secure baseline and how to “harden” your enterprise architectures from the most advanced attacks. Once a strategy for a fortified perimeter is defined the course moves on to defending against the sophisticated malware that is on the rise today and the importance of “live” memory analysis and real time monitoring.

Come experience a comprehensively structured and fast paced program that immerses you into the mysterious world of the “hacker”, providing insights of their mindset; a critical weapon for defending against some of the most malicious attacks around.

by Kevin Cardwell

www.rikazglobal.wordpress.com

Page 2: CAST 614 - rikazglobal.files.wordpress.com · • Intrusion Detection 101 • Advanced Filtering Techniques • Firewall Types: ... • Upon completion of the course, each participants
Page 3: CAST 614 - rikazglobal.files.wordpress.com · • Intrusion Detection 101 • Advanced Filtering Techniques • Firewall Types: ... • Upon completion of the course, each participants

With this course you can be among the few who transcend the old idea of the hacker having all the fun, take pride being the defender, form an offensive mindset to skillfully orchestrate robust and solid defenses and reinvent popular belief by beating the hacker at his own game.

You will be evaluating advanced “hacks” and methods of defense fortification bringing you closer to establishing perfect security by reviewing best practices and methodologies you can apply to secure environments, provide segmentation and isolation to reduce the effectiveness of the Advanced Persistent Threat.

Participants completing this course will gain in-depth knowledge in the following areas:• Staging a strong defense against popular security

threats.• Fortifying your organization with a good foundation

of risk protection methods.• Applying latest references and guidance on best

practices in the field of cyber security.• Securing your enterprise architecture from a medium

threat level and building towards more sophisticated threats.

From practically any organization that handles important data would find this course beneficial:• Government agencies• Universities• Retail• Banking and Financial institutions• Brokerage and Trading firms• Insurance• Scientific institutions & research agencies• Telecommunication• Computer design firms• Those involved with online related businesses &

transactions• Card related businesses

COURSE OVERVIEW

FEATURES

WHO SHOULD ATTEND?

Page 4: CAST 614 - rikazglobal.files.wordpress.com · • Intrusion Detection 101 • Advanced Filtering Techniques • Firewall Types: ... • Upon completion of the course, each participants

• Firewalls

• Firewall Types: Stateless Packet Filters

• Improving Device Remote-Access Security • Windows NT/2000/2003 and XP

• Fortress Mentality

• Intrusion Detection 101

• Advanced Filtering Techniques

• Firewall Types: Stateful Packet Filters

• Application Proxies • Current network connections and Open ports

• Processes that opened ports

• Cached NetBIOS Names

• NAC Defined

• NAC General Architecture

• NAC General Architecture Illustrated Users Currently

• Advanced Filtering Techniques

• Ingress Filtering

• Egress Filtering • Injection Flaws

• Cross Site Scripting

• Broken Authentication

• OS platforms

• Server Architecture

• Broken Kernel

LAB: Securing the Perimeter

LAB: Intrusion Detection

LAB: Selecting a Firewall Architecture

LAB: Memory Analysis

LAB: Network Access Protection with DHCP

LAB: Advanced Filtering

LAB: Protecting Web Apps

LAB: Hardening

COURSE OUTLINEFIREWALLS INTRUSION DETECTION AND

PREVENTION WHY INTRUSION DETECTION?

FIREWALL CONFIGURATION

MEMORY ANALYSIS

ENDPOINT PROTECTION

ADVANCED FILTERING

PROTECTING WEB APPLICATIONS

HARDENING:ESTABLISHING A SECURE BASELINE

NOTE : Course Outline sneak only, for complete details contact us. (see next page for contact information.)

Page 5: CAST 614 - rikazglobal.files.wordpress.com · • Intrusion Detection 101 • Advanced Filtering Techniques • Firewall Types: ... • Upon completion of the course, each participants

How will this course benefit you?• Executing a set of techniques that are critical to the protection

of your entire enterprise against some of today’s most advanced threats.

• Reviewing methods of system deployments in as secure a state as possible while supporting your daily business requirements.

• Applying necessary techniques required for malware identification throughout the enterprise even in the case of the malware not being detectable by any of your security controls.

• Staging Advanced Attacks to appreciate methods of correctly eliminating or mitigating risk to an acceptable level.

• Each individual client receives the required high level of training that is benchmarked to international best practise and standards.

• This course will be specifically designed to meet the needs of each individual, based according to their current skills and pace of learning to meet your organisation’s unique objectives and goals.

• You can be rest assured that all challenges and objectives pertaining to your organisation’s goals can be discussed in an environment that ensures complete confidentiality.

• Upon completion of the course, each participants will receive Training certificate of attendance.

WHY YOU SHOULD ATTEND?

KEY FEATURES:

Page 6: CAST 614 - rikazglobal.files.wordpress.com · • Intrusion Detection 101 • Advanced Filtering Techniques • Firewall Types: ... • Upon completion of the course, each participants

COURSE DIRECTOR : KEVIN CARDWELL

JKevin Cardwell spent 22 years in the U.S. Navy, during this time he tested and evaluated Surveillance and Weapon system software, some of this work was on projects like the Multi-Sensor Torpedo Alertment Processor (MSTRAP), Tactical Decision Support System (TDSS), Computer Aided Dead Reckoning Tracer (CADRT), Advanced Radar Periscope Discrimination and Detection (ARPDD), and the Remote Mine Hunting System (RMHS). He has worked as both software and systems engineer on a variety of Department of Defense projects and early on was chosen as a member of the project to bring Internet accessto ships at sea. Following this highly successful project he was selected to head the team that built a Network Operations Center (NOC) that provided services to the commands ashore and ships at sea in the Norwegian Sea and Atlantic Ocean. He served as the Leading Chief of Information Security at the NOC for six years prior to retiring from the U.S. Navy. During this time he was the leader of a 5 person Red Team that had a 100% success rate at compromising systems and networks.

He currently works as a free-lance consultant and provides consulting services for companies throughout the world, and as an advisor to numerous government entities within the US and UK . He is an Instructor, Technical Editor and Author for Computer Forensics, and Hacking courses. He is technical editor of the Learning Tree Course Ethical Hacking and Countermeasures and Computer Forensics. He is author of the Controlling Network Access course. He has presented at the Blackhat USA Conferences. He is a contributing author to the Computer Hacking Forensics Investigator V3 Study Guide and The Best Damn Cybercrime and Digital Forensics Book Period. He is a Certified Ethical Hacker (CEH), Certified Security analyst (E|CSA), Qualified Penetration Tester (QPT), Certified in Handheld Forensics, Computer Hacking Forensic Investigator (CHFI) and Live Computer Forensics Expert (LCFE), and holds a BS in Computer Science from National University in California and a MS in Software Engineering from the Southern Methodist University (SMU) in Texas. His current research projects are in Computer Forensic evidence collection on “live” systems, Professional Security Testing and Advanced Rootkit technologies. He developed the Strategy and Training Development Plan for the first Government CERT in the country of Oman, he servers as a professional training consultant to the Oman Information Technology Authority, and is currently developing the team to man the first Commercial Security Operations Center in the country of Oman.

Page 7: CAST 614 - rikazglobal.files.wordpress.com · • Intrusion Detection 101 • Advanced Filtering Techniques • Firewall Types: ... • Upon completion of the course, each participants
Page 8: CAST 614 - rikazglobal.files.wordpress.com · • Intrusion Detection 101 • Advanced Filtering Techniques • Firewall Types: ... • Upon completion of the course, each participants

Building 34318th November Street, Al Azaiba

Muscat, Sultanate of OmanTel: +968 2449 2863 | 2449 2849

Fax: +968 2449 1994Email: [email protected]

Web: www.RikazGlobal.WordPress.com

FOR MORE INFORMATION...