סייבר ואבטחת מידע

Network Cyber-Research

מספר הקורס 71576

למה ללמוד בג'ון ברייס?
  • למידה חדשנית ודינמית עם כלים מתקדמים בשילוב סימולציות, תרגול וסביבות מעבדה
  • מגוון הכשרות טכנולוגיות עם תכנים המותאמים להתפתחות הטכנולוגית ולביקוש בתעשיית ההייטק
  • מובילים את תחום ההכשרות לעולם ההייטק והטכנולוגיה כבר 30 שנה, עם קהילה של עשרות אלפי בוגרים
  • אתם בוחרים איך ללמוד: פרונטאלית בכיתה, מרחוק ב- Live Class או בלמידה עצמית

המועדים הקרובים

קורס לקבוצות

הקורס נפתח במתכונת של קבוצה בלבד, בהתאמה אישית לארגונים.
לפרטים נוספים: Muzman@johnbryce.co.il

משך הקורס

שעות לימוד:

40

מספר מפגשים:

קורס בוקר:

5

מתכונת הקורס

הקורסים המוזמנים לארגונים מותאמים באופן אישי ומלא לצרכי הארגון, מערכי הלימוד גמישים וניתן לשלב בהם תכנים רלוונטיים וייעודיים.

Overview

Large and small companies face a critical stage; cyber-attacks have transformed dramatically over the past few years. Unfortunately, organizations are still being breached too often and are under more pressure than ever to secure their systems. The Network Security course aims to address cyber challenges experienced on the network level. The course covers various attack techniques and how to defend against them.

By the end of the course, participants will have the ability to build and maintain a secure network, protect data, manage vulnerabilities, implement active access control measures, and regularly monitor the network for inconsistencies.

The course sets the groundwork for later specialization in cyber forensics, advanced cyber defense, and penetration testing.

The course helps prepare for the certification exams Linux+ (CompTIA) and LPIC-2 (LPI).

Objectives

Become familiar with the cyber threat landscapes

Acquire the knowledge and tools to recognize threats in the network

Test networks and network-based-systems for vulnerabilities

Understand cyber-attacks

Become familiar with a variety of available tools for performing security-related tasks

Who Should Attend

The course targets participants with foundation knowledge in computer networking, who wish to operate a SOC on the analyst and incident responder levels, or individuals who serve as corporate security analysts. Incident responders System/network administrators IT security personnel

תכנית הלימודים

Full syllabus
PDF להורדה

Module 1: Introduction to Linux

Students will study the Linux OS fundamentals during this module – How to use basic commands, manipulation of text and command outputs, understanding the Terminal-Emulator, permissions, and other security concepts.

  • Virtualization
    • Introduction to Virtualization
    • About Linux Distro
    • Installing Linux
    • Working with VMWare
    • Bridged vs. NAT
  • Working with Linux
    • Linux Directories
    • Linux Users
    • Packages
    • File Manipulation Commands
    • Text and File Manipulation Technics
    • Writing Linux Scripts

Module 2: Networking

During this module, participants will study network infrastructures, common network types, network Layers, communication between protocols, communication between network devices from different Layers, and network anonymity methods.

  • Protocols and Services
    • TCP/IP and OSI Model
    • DNS
    • DHCP
    • ARP
    • Remote Connection Protocols
    • Important Protocols
  • Wireshark – Diving into Packets
    • Non-Secure and Secure Packets
    • Filtering and Parsing
    • Extracting Objects and Files from PCAP Files

Module 3: Introduction to Network Forensics

Large organizations these days suffer greatly from network attacks and malicious intrusions. Those who manage the organization’s network have an immense impact on ensuring its safety. This module will introduce participants to Network Forensics and learn how to locate and better understand various attacks.

  • Windows Tools
    • Advanced Wireshark
    • NetworkMiner
    • Sysinternals
  • Linux Tools
    • TShark – Network Analyzing Automation
    • Zeek Tools: Bro and Bro-Cut

Module 4: Cyber Security

This module’s primary goal is to teach participants to embrace the attacker state-of-mind to recognize the necessary defense mechanisms. Participants will deal with several types of attacks. Students will learn about hash functions; furthermore, they will learn how wireless networks are attacked and how they are vulnerable to those attacks. Social engineering and honeypot techniques will also be demonstrated.

  • Cyber Security Vectors
    • Anti-Viruses
    • Firewalls and FWNG
    • DoS and DDoS
    • CNC Servers and Botnets
    • Wireless Attack Concepts
    • Steganography
  • Network Attacks
    • Introduction to Scanning
    • Scanning Methods in Nmap
    • Scanning with Shodan
    • MiTM
    • ARP Poisoning
    • DHCP Starvation
    • LLMNR Attacks
  • Cyber Attack Practice
    • Backdooring
    • Privilege Escalation
סימולטור - Cyberium Arena

The courses at John Bryce Training allow you to gain experience with unique simulators and hands-on practice labs that include a variety of scenarios. Students are given the opportunity to put in practice what they have learned in order to retain all the relevant skills and information they were given throughout the course, this way upgrading their knowledge and expertise.

The simulator that is used in the hands on practice labs is The Cyberium system. This is an advanced cyber scenario simulator which has been developed by cyber experts who have been constantly involved in cyber training and in giving knowledge gaps solutions in the field of cyber. The simulator includes two main types of scenarios – educational and realistic.

Each educational scenario is focused on a different aspect of the course and simulates a specific aspect of the training topics. Each issue or topic taught in the course has a point exercise that allows the student to focus on it and deeply learn it.

The realistic scenarios simulate possible or past incidents related to Information Security. This includes everything from topics such as the Regulation of Cyber Systems to Attacks by Terrorist Hacker Organizations. These scenarios are broader than the educational exercises and require more of a systemic, strategic and comprehensive vision.

After each scenario, the system automatically generates detailed reports that serve as immediate feedback that allows the student and lecturer to measure the abilities, strengths, and weaknesses of the participant.

קורסים מקצועיים למתקדמים