ioti1.jpg

Introduction to Cyber Warfare

Start Date:
March o8,  2021
Course Cost:
$1700 
Academic Hours:
40 hrs. 5 weeks
Mode:
100% Online 
Overview

When exactly did information security become cyber warfare? What changed? How do modern attacks against information systems differ from what hacking was 5-10 years ago? Old defense doctrines are ineffective against modern APT-like scenarios.

 

Successful attacks are no longer measured by whether the perimeter was breached. The student learns to understand that the breach is inevitable and true defenses are organic, highly-iterative, mixed approached and heavily dependent on human resource.

 

Effective security operations have to correspond to the modern kill-chain, so before security can be implemented, specific attack scenarios should be carefully examined. The student will understand the concepts of reactive vs. proactive security.

Join Our Cyber Security Community 

To get Access to better job opportunities.

contact-form-join.jpg
On Completion, you will know about
 

What is cyber and the digital universe?

What is denial of service and how it is performed?

How is information gathering performed?

How to gain privileges (with brute-forcing and without)?

How to inject code into interpreted context?

How to exploit vulnerable code?

Woman on Computer

Security truisms

What are blacklists and how are they implemented?

What are whitelists and how are they implemented?

How to improve authentication mechanisms?

How to better manage your current assets?

How to create baselines and detect anomalies?

Man Working at Desk

How to use and improve the human factor?

What are APTs?

What is the anatomy of a modern breach?

How do mitigation strategies compare?

How is security a process?

What is security by design?

Who should attend

Our public course targets entry level participants – basic technical knowledge is required in Networking and basic understanding of Linux is of an advantage but not necessary. 

 

Sales, pre-sales, customer support, product, business development and management personnel.

Office

Learn from the best in the world

Full Syllabus

Part 1: Threat Landscape

  • Agenda etc.

  • What is cyber and the digital universe

  • Damage 1: denying service

    • Flooding

    • Spoofing

    • Protocol malformations

    • Reflections and amplifications

  • Damage 2: information gathering

    • Scanning, fingerprinting and enumeration

    • Manual vs. Automated spidering

    • Credential harvesting

    • Resource mapping

    • Error based information disclosure

  • Damage 3: gaining privileges

    • Brute-force logins and passwords

    • Password hashes and password dictionaries

    • Custom dictionaries and password complexity

    • Bypass authentication mechanisms

    • Bypass session management

    • Bypass OS user and fs permissions

    • Bypass security software​

  • Damage 4: injecting code

    • cmd OS injections

    • data-store injections

    • file injections (XML, json, etc)

    • remote file and resource inclusion

    • injecting web clients (browsers)

    • injecting client applications (office, pdf, etc)

Damage 5: binary exploitation

  • Buffer, stack and heap overflows

  • Browser and plugin exploitation

  • Memory corruptions

  • Code execution

Part-2: Mitigation strategies                                                           

  • What is defense all about

  • Mitigation 1: blacklists

    • IP blacklists

    • Anti-malware defenses

    • URL filtering (... and ad blocking too)

    • Block mail SPAM and spoofs

    • Application firewalls (proxies and reverse-proxies, WAFs, DB-fw)

    • IDS/IPS/HIPS

  • Mitigation 2: whitelists

    • NAC

    • Firewalls and access-lists

    • Application whitelisting

    • Application firewalls (positive proxies and reverse-proxies)

    • Web content filtering (WAFs and application-layer filtering)

  • Mitigation 3: better authentication

    • strong passphrases

    • certificates

    • cryptography

    • multi-factor authentication

    • permissions and the ‘need to know’ rule

    • admins (locale & domain) and roots

    • audit

  • Mitigation 4: manage your assets

    • patch operating systems and applications

    • perform vulnerability scans

    • harden OS and application configurations

    • maintain a ‘master’ system image bank

    • backup and disaster recovery

    • keep detailed logs and network traffic captures

  • Mitigation 5: misbehave is the new malware

    • New rule: do not block

    • Sandboxes and dynamic analysis

    • Honeypots and decoys

    • Exploit mitigation tools

    • Centralized log collection and analysis (aka SIEM)

    • Network/host-based anomaly detection

    • Heuristic A/V and HIPS

  • Mitigation 6: it’s all about the people

    • New profession: security analyst

    • User education

    • Skill assessment and training (of security teams)

    • Secure coding for developers

    • Penetration test

Part-3: Putting it all together (optional)         

                               

  • Worst case scenarios (APT breach case study)

  • APT kill-chains

  • Security truisms

  • Mitigation strategies compared (ASD mitigations)

  • Security as a process (SANS 20 CSC)

  • What is security by design?

  • Final project: Security by design

Get a call back from a
Cyber Security education Consultant
contact-form.jpg
Image by Jud Mackrill
Call us 1300 783 985

Head Office:
Perth, Western Australia

Learn from the best in the world

  • ioti cyber security courses

For news and updates, subscribe to our newsletter today

© 2021 by Unleash Design. Proudly created with Wix.com