hands-on network forensics training

Ofisgate Training Program
Headquarters:
Ofisgate Sdn Bhd (610820-A), 2-15 Jalan Jalil Perkasa 13
Aked Esplanad, Bukit Jalil, 57000 Kuala Lumpur, Malaysia
Regional Office:
Ofisgate (s) Pte Ltd, 205B Thompson Road,
Goldhill Centre, Singapore
www.ofisgate.com
Introduction
Ofisgate offers a variety of training solutions for Network Administrator, IT
support, Application Developer, IT managers, Security Officers and
Professionals.
We believe training should be:
Customized.Innovative.Effective.Collaborative.Interactive.
Ofisgate Training Solutions :
• Hands-On Training
 3 Days Hands-On Network Forensics Training
 3 Days Hands-On Network Security and Penetration Test
Training
 3 Days Hands-On QualNet Simulation Training
 2 Days Hands-On IPV6 Training
• 1 day Seminars & Hands- On Workshops ( Open participant)
 Network Forensics a Hands-On
Workshop using Open Source
www.ofisgate.com
Training Program
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK FORENSICS TRAINING
Training Summary
This course gives an advanced look at the TCP/IP architecture – its protocols and
message formats - that will be useful to the network diagnostician.
The course will examine many of the popular tools and applications, both open and
commercial, which are available to assist in problem determination on today’s most
popular implementations.
The course will also provide a problem determination methodology useful in
addressing future network problem scenarios. This class will have numerous hands-on
labs designed to illustrate typical IP scenarios on popular platforms. Specifics of these
labs should be customized with the course director.
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK FORENSICS TRAINING Continue….
Audience
Network Administrator, IT Support , Application Developer and IT Managers
Duration
3 Days Classroom
Approach
This class is taught by lecture with hands-on training
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK FORENSICS TRAINING Continue….
Course Content
MODULE 1 : An Introduction to Network Forensics
• OSI Layer
• Packet Analysis using Network Analyzers
MODULE 2 : Essentials for Network Forensics
• Overview
• How Network Forensics work
•Types of Analysis
•Troubleshooting Methodology
• Analyzer / Tools Placement
• Hands-On : Placement of Wireshark inside the network and start capture
MODULE 3: Navigating the Wireshark Overview
• Start Page
• Menu Options
•Moving Around in the application
•Graphing
•Base Lining
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK FORENSICS TRAINING Continue….
Course Content
MODULE 4 : Capturing Data and Filtering
• What to capture, and where
• Capture Challenges
• Capture option Window
MODULE 5 : Filtering
• Filtering Overview
• Types of Filters
• Basic & Advanced Filtering
•Hands-On : Network Troubleshooting
MODULE 6 : Application Analysis and Performance
• What is application Analysis ?
• Correlating events with conversations
•Troubleshooting common application problem
•Expert tuning methodology
•Hands-On : Application Performance Analysis
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK FORENSICS TRAINING Continue….
MODULE 7 : Security Analysis
• Legacy servers and application, older network devices
• Analyzing malware behavior
•Hands-On : Sniffing User ID and password over the network
End
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING
Course Description
The goal of the ethical hacking and countermeasures program is to help the
organization take pre-emptive measures against malicious attacks by attacking the
system himself; all the while staying within legal limits. This philosophy stems from the
proven practice of trying to catch a thief, by thinking like a thief. As technology
advances and organization depend on technology increasingly, information assets
have evolved into critical components of survival.
Summary
This course consists of the following modules - Ethics and Legal Issues, Foot printing,
Scanning, Enumeration, System Hacking, Trojans and Backdoors, Sniffers, Denial of
Service, Social Engineering, Session Hijacking, Hacking Web Servers, Web Application
Vulnerabilities, Web Based Password Cracking Techniques, SQL Injection, Hacking
Wireless Networks, Virus and Worms, Physical Security, Hacking Linux, IDS, Firewalls
and Honeypots, Buffer Overflows, Cryptography, Penetration Testing Methodologies
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont..
Audience
Security Officers, Auditors, Security Professionals, Site Administrators, Anyone who is
concerned about the integrity of the network infrastructure
Duration
3 Days Classroom
Approach
This class is taught by lecture with hands-on training
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont..
Course Content
MODULE 1 : An Introduction to Penetration Testing
• What is Penetration Testing ? (Blackbox vs Whitebox Testing)
• What are the responsibilities for a Penetration Tester ?
•An Overview of the Open-Source Security Testing Methodology Manual
•Methodology for Penetration Testing
•Penetration Testing Options
•Vulnerability Result Report Writing
•Understanding Hackers
•What Hackers Do – Hackers / Administrators View
•Who are Hackers
•Categorizing Hackers
•Attack Categories
•Intrusion Methods
•The Security Process and The CIA Model
•Threat Analysis
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont..
Course Content
MODULE 2 : Active-Passive Reconnaissance Techniques
• Planning and starting the test
• Information Gathering & Footprinting
•Passive Information Gathering
•Advanced Search Techniques (Spam DBs, P2P networks)
•Whois Search
•Active Information Gathering
•Using Information Gathering Tools ( tracert, nslookup,zone transfer)
•Gathering Tools ( tracert, nslookup,zone transfer)
• Hands- On Session (Scanning & Fingerprint)
• Port Scanning Technique (using port scanning tools)
•An introduction to hping
•What is hping
•How do you use hping
•Advance hping usage
•OS Fingerprinting- how does it work?
•OS Fingerprint Tools Service Probing
•Hands-On Session
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont..
Course Content
MODULE 3 : Vulnerability Assessment
• Understanding Vulnerabilities
• Types of Vulnerability
•Technique for Finding Vulnerability
•Automated vulnerability Scanning Tools
•Open Source vulnerability scanners
•Commercial vulnerability Scanners
•Nessus 4
•Microsoft MBSA
•Sysinternals Tools
•Hands-on Session
www.ofisgate.com
MODULE 4 : Hacking
• Windows Architecture Overview
•Vulnerabilities & attacks
•Remote password guessing
•Tapping the wire
•Password cracking
•Password sniffers
•Hiding Files
•Buffer overflows
•Hands-On session
Hands-On Training
HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont..
Course Content
MODULE 5 : Attacking Web Technologies
• Web Server Assessment Overview
•Introduction to Web Servers
•Web Server Market
•Popular Web Servers and common Vulnerabilities
•Tools used in attacking web servers
•Web server Countermeasures
•Web application Penetration methodologies
•Understanding Web application Security
•Common Web application Security Vulnerabilities
•Input Manipulation
•Authentication and Session Management
•Web Application Countermeasures
•Password Cracking Techniques
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont..
Course Content
MODULE 6 : Wireless Hacking
• 802.11 Architecture
•Wireless Authentication
•802.1x standard
•Attack Vectors
•Wireless Hacking using Backtrack 5
•Wireless Attack Countermeasures
• Hands-On Session
www.ofisgate.com
Hands-On Training
HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont..
Additional Modules
Some or all of the following topics are covered in the regular outline above.
However, if the class is running ahead of schedule they will be covered in more detail
as follows.
TCP /IP Refresher
•
•
•
•
•
•
•
•
•
•
•
•
Social Engineering
•
What is social engineering ?
TCP/IP Basics
•
The art of deception
The OSI Model
•
Human Weakness
TCP vs UDP
Dumpster Diving
TCP Internals- an introduction to TCP •
•
Shoulder Surfing
headers
•
Mail attachments
MTU & TTL
•
Phishing websites
ARP & MAC Addresses
•
Countermeasures
Error Control
Fragmentation
Denial of Service
NAT
•
What is denial of service?
Routing
•
What is the point of DoS?
Recommendation for further reading •
What is DDoS ?
(TCP /IP Illustrated Vol.1 etc.)
•
What is DRDoS ?
References
•
How DDoS can effect a
company financially
www.ofisgate.com
Hands-On Training
QUALNET SIMULATION TRAINING
Summary
SCALABLE Training Workshops teach new QualNet® software users to become
proficient with the tools quickly.
A SCALABLE Training Workshop is a 3-day course that gets progressively more
advanced.
•Day 1 provides an introduction to the QualNet graphical user interface and
networking concepts in the framework of QualNet models
•Day 2 features advanced simulation concepts
•Day 3 covers more advanced topics, such as building simple protocols in
designer
Duration
3 Days Classroom
Approach
This class is taught by lecture with hands-on training
www.ofisgate.com
Hands-On Training
QUALNET SIMULATION TRAINING Cont…
Course Content
• Software Installation
• License Server Installation
• Related Issues
Day 1
Introduction to QualNet
• Module 1 : Qualnet Installation (Lecture & Hands-On)
•Module 2 : Qualnet IDE Functional Overview (Lecture)
•Module 2 : Qualnet IDE Functional Overview (Hands-On)
•Module 3 : Basic Wired & Wireless (Lecture)
•Module 3 : Basic Wired & Wireless (Hands-On)
Day 2
Advanced QualNet
•Module 4 : Advanced Wired & Wireless (Lecture & Hands-On)
•Module 4 : Advanced Wired & Wireless (Lecture & Hands-On)
•Module 5 : Common Line (Lecture & Hands-On)
•Module 6 : QualNet Achitecture, Code Modification Guidelines, Emulation
Guidelines
www.ofisgate.com
Day 3
Hands-On Training
HANDS-ON INTERNET PROTOCOL VERSION 6 (IPV6) LEVE L 1 TRAINING
Course Description
The CNE6 courses are intended for network and system engineers who need to
understand the new features and operational characteristics of network based on
IPv6. The Level 1(Silver) course introduces participants to the basic concept of IPv6
and how these dier from IPv4, related protocols, and the various transition
mechanisms and help add support for IPv6 into existing networks.
Audience
Network engineers, managers, and anyone interested in IPv6 deployment. The
hands-On session and demos would be particularly important for operational
engineers, while the more general discussion and review of issues involved would be
highly relevant to managers and other decision makers.
Duration
2 Days Classroom
Approach
This class is taught by lecture with hands-on training
www.ofisgate.com
Hands-On Training
HANDS-ON INTERNET PROTOCOL VERSION 6 (IPV6) LEVEL 1TRAINING Cont..
Course Content
MODULE 1 : An Introduction to
IPV6
• Refresher on IP Addressing
• IP Address Management
•Issues with IPV4
• IPV6 , Solution to IPV6 Depletion
•Features of IPV6
•IPV6 DNS
•Benefits of IPV6
•What’s Next ?
MODULE 2 :
Addressing Architecture
MODULE 3 :
Packet Structure and Header Formats
MODULE 4 :
Header Extensions
MODULE 5 :
ICMPv6 & Neighbor Discovery (ND)
MODULE 6 :
TRANSITION MECHANISMS : Dual Stack, tunneling and translation
www.ofisgate.com
For enquiries about our products, services or to schedule a sales presentation:
e: [email protected]
For contact information:
OFISGATE SDN BHD (610820-A)
2-15, Jalan Jalil Perkasa 13,
Aked Esplanad, Bukit Jalil,
57000 Kuala Lumpur, MALAYSIA.
Tel: +603 8994 0778
Fax: +603 8994 0779
www.ofisgate.com