Presentation is loading. Please wait.

Presentation is loading. Please wait.

L e a d i n g I C T s o l u t i o n c o m p a n y

Similar presentations


Presentation on theme: "L e a d i n g I C T s o l u t i o n c o m p a n y"— Presentation transcript:

1 L e a d i n g I C T s o l u t i o n c o m p a n y
Ofisgate Corporate Ofisgate Training Program L e a d i n g I C T s o l u t i o n c o m p a n y Headquarters: Ofisgate Sdn Bhd ( A), 2-15 Jalan Jalil Perkasa 13 Aked Esplanad, Bukit Jalil, Kuala Lumpur, Malaysia Regional Office: Ofisgate (s) Pte Ltd, 205B Thompson Road, Goldhill Centre, Singapore

2 Introduction Ofisgate offers a variety of training solutions for Network Administrator, IT support, Application Developer, IT managers, Security Officers and Professionals. We believe training should be:  Customized.Innovative.Effective.Collaborative.Interactive. Ofisgate Training Solutions : Hands-On Training 3 Days Hands-On Network Forensics Training 3 Days Hands-On Network Security and Penetration Test Training 3 Days Hands-On QualNet Simulation Training 2 Days Hands-On IPV6 Training 1 day Seminars & Hands- On Workshops ( Open participant) Network Forensics a Hands-On Workshop using Open Source

3 Training Program

4 HANDS-ON NETWORK FORENSICS TRAINING
Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Training Summary This course gives an advanced look at the TCP/IP architecture – its protocols and message formats - that will be useful to the network diagnostician. The course will examine many of the popular tools and applications, both open and commercial, which are available to assist in problem determination on today’s most popular implementations. The course will also provide a problem determination methodology useful in addressing future network problem scenarios. This class will have numerous hands-on labs designed to illustrate typical IP scenarios on popular platforms. Specifics of these labs should be customized with the course director.

5 HANDS-ON NETWORK FORENSICS TRAINING Continue….
Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. Audience Network Administrator, IT Support , Application Developer and IT Managers Duration 3 Days Classroom Approach This class is taught by lecture with hands-on training

6 Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue….
Course Content MODULE 1 : An Introduction to Network Forensics OSI Layer Packet Analysis using Network Analyzers MODULE 2 : Essentials for Network Forensics Overview How Network Forensics work Types of Analysis Troubleshooting Methodology Analyzer / Tools Placement Hands-On : Placement of Wireshark inside the network and start capture MODULE 3: Navigating the Wireshark Overview Start Page Menu Options Moving Around in the application Graphing Base Lining

7 Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue….
Course Content MODULE 4 : Capturing Data and Filtering What to capture, and where Capture Challenges Capture option Window MODULE 5 : Filtering Filtering Overview Types of Filters Basic & Advanced Filtering Hands-On : Network Troubleshooting MODULE 6 : Application Analysis and Performance What is application Analysis ? Correlating events with conversations Troubleshooting common application problem Expert tuning methodology Hands-On : Application Performance Analysis

8 MODULE 7 : Security Analysis
Hands-On Training HANDS-ON NETWORK FORENSICS TRAINING Continue…. MODULE 7 : Security Analysis Legacy servers and application, older network devices Analyzing malware behavior Hands-On : Sniffing User ID and password over the network End

9 HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING
Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Course Description The goal of the ethical hacking and countermeasures program is to help the organization take pre-emptive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. This philosophy stems from the proven practice of trying to catch a thief, by thinking like a thief. As technology advances and organization depend on technology increasingly, information assets have evolved into critical components of survival. Summary This course consists of the following modules - Ethics and Legal Issues, Foot printing, Scanning, Enumeration, System Hacking, Trojans and Backdoors, Sniffers, Denial of Service, Social Engineering, Session Hijacking, Hacking Web Servers, Web Application Vulnerabilities, Web Based Password Cracking Techniques, SQL Injection, Hacking Wireless Networks, Virus and Worms, Physical Security, Hacking Linux, IDS, Firewalls and Honeypots, Buffer Overflows, Cryptography, Penetration Testing Methodologies

10 HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont..
Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Audience Security Officers, Auditors, Security Professionals, Site Administrators, Anyone who is concerned about the integrity of the network infrastructure Duration 3 Days Classroom Approach This class is taught by lecture with hands-on training

11 MODULE 1 : An Introduction to Penetration Testing
Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 1 : An Introduction to Penetration Testing What is Penetration Testing ? (Blackbox vs Whitebox Testing) What are the responsibilities for a Penetration Tester ? An Overview of the Open-Source Security Testing Methodology Manual Methodology for Penetration Testing Penetration Testing Options Vulnerability Result Report Writing Understanding Hackers What Hackers Do – Hackers / Administrators View Who are Hackers Categorizing Hackers Attack Categories Intrusion Methods The Security Process and The CIA Model Threat Analysis

12 MODULE 2 : Active-Passive Reconnaissance Techniques
Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 2 : Active-Passive Reconnaissance Techniques Planning and starting the test Information Gathering & Footprinting Passive Information Gathering Advanced Search Techniques (Spam DBs, P2P networks) Whois Search Active Information Gathering Using Information Gathering Tools ( tracert, nslookup,zone transfer) Gathering Tools ( tracert, nslookup,zone transfer) Hands- On Session (Scanning & Fingerprint) Port Scanning Technique (using port scanning tools) An introduction to hping What is hping How do you use hping Advance hping usage OS Fingerprinting- how does it work? OS Fingerprint Tools Service Probing Hands-On Session

13 MODULE 3 : Vulnerability Assessment
Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 3 : Vulnerability Assessment Understanding Vulnerabilities Types of Vulnerability Technique for Finding Vulnerability Automated vulnerability Scanning Tools Open Source vulnerability scanners Commercial vulnerability Scanners Nessus 4 Microsoft MBSA Sysinternals Tools Hands-on Session MODULE 4 : Hacking Windows Architecture Overview Vulnerabilities & attacks Remote password guessing Tapping the wire Password cracking Password sniffers Hiding Files Buffer overflows Hands-On session

14 MODULE 5 : Attacking Web Technologies
Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 5 : Attacking Web Technologies Web Server Assessment Overview Introduction to Web Servers Web Server Market Popular Web Servers and common Vulnerabilities Tools used in attacking web servers Web server Countermeasures Web application Penetration methodologies Understanding Web application Security Common Web application Security Vulnerabilities Input Manipulation Authentication and Session Management Web Application Countermeasures Password Cracking Techniques

15 MODULE 6 : Wireless Hacking
Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Course Content MODULE 6 : Wireless Hacking Architecture Wireless Authentication 802.1x standard Attack Vectors Wireless Hacking using Backtrack 5 Wireless Attack Countermeasures Hands-On Session

16 HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont..
Hands-On Training HANDS-ON NETWORK SECURITY AND PENETRATION TEST TRAINING Cont.. Additional Modules Some or all of the following topics are covered in the regular outline above. However, if the class is running ahead of schedule they will be covered in more detail as follows. TCP /IP Refresher TCP/IP Basics The OSI Model TCP vs UDP TCP Internals- an introduction to TCP headers MTU & TTL ARP & MAC Addresses Error Control Fragmentation NAT Routing Recommendation for further reading (TCP /IP Illustrated Vol.1 etc.) References Social Engineering What is social engineering ? The art of deception Human Weakness Dumpster Diving Shoulder Surfing Mail attachments Phishing websites Countermeasures Denial of Service What is denial of service? What is the point of DoS? What is DDoS ? What is DRDoS ? How DDoS can effect a company financially

17 Hands-On Training QUALNET SIMULATION TRAINING Summary Duration
SCALABLE Training Workshops teach new QualNet® software users to become proficient with the tools quickly. A SCALABLE Training Workshop is a 3-day course that gets progressively more advanced. Day 1 provides an introduction to the QualNet graphical user interface and networking concepts in the framework of QualNet models Day 2 features advanced simulation concepts Day 3 covers more advanced topics, such as building simple protocols in designer Duration 3 Days Classroom Approach This class is taught by lecture with hands-on training

18 Hands-On Training Day 1 Day 2 Day 3 QUALNET SIMULATION TRAINING Cont…
Course Content Software Installation License Server Installation Related Issues Day 1 Introduction to QualNet Module 1 : Qualnet Installation (Lecture & Hands-On) Module 2 : Qualnet IDE Functional Overview (Lecture) Module 2 : Qualnet IDE Functional Overview (Hands-On) Module 3 : Basic Wired & Wireless (Lecture) Module 3 : Basic Wired & Wireless (Hands-On) Day 2 Advanced QualNet Module 4 : Advanced Wired & Wireless (Lecture & Hands-On) Module 5 : Common Line (Lecture & Hands-On) Module 6 : QualNet Achitecture, Code Modification Guidelines, Emulation Guidelines Day 3

19 Hands-On Training Course Description Audience Duration Approach
HANDS-ON INTERNET PROTOCOL VERSION 6 (IPV6) LEVE L 1 TRAINING Course Description The CNE6 courses are intended for network and system engineers who need to understand the new features and operational characteristics of network based on IPv6. The Level 1(Silver) course introduces participants to the basic concept of IPv6 and how these dier from IPv4, related protocols, and the  various transition mechanisms and help add support for IPv6 into existing networks. Audience Network engineers, managers, and anyone interested in IPv6 deployment. The hands-On session and demos would be particularly important for operational engineers, while the more general discussion and review of issues involved would be highly relevant to managers and other decision makers. Duration 2 Days Classroom Approach This class is taught by lecture with hands-on training

20 MODULE 1 : An Introduction to IPV6
Hands-On Training HANDS-ON INTERNET PROTOCOL VERSION 6 (IPV6) LEVEL 1TRAINING Cont.. Course Content MODULE 1 : An Introduction to IPV6 Refresher on IP Addressing IP Address Management Issues with IPV4 IPV6 , Solution to IPV6 Depletion Features of IPV6 IPV6 DNS Benefits of IPV6 What’s Next ? MODULE 2 : Addressing Architecture MODULE 3 : Packet Structure and Header Formats MODULE 4 : Header Extensions MODULE 5 : ICMPv6 & Neighbor Discovery (ND) MODULE 6 : TRANSITION MECHANISMS : Dual Stack, tunneling and translation

21 Thank You For enquiries about our products, services or to schedule a sales presentation: e: For contact information: OFISGATE SDN BHD ( A) 2-15, Jalan Jalil Perkasa 13, Aked Esplanad, Bukit Jalil, Kuala Lumpur, MALAYSIA. Tel: Fax:


Download ppt "L e a d i n g I C T s o l u t i o n c o m p a n y"

Similar presentations


Ads by Google