Cyber Range

In the current cyber threat landscape, knowledge is important but always in-sufficient. In order to keep an organisation secure, yourself and your team are required to equip with the right skillsets and competencies. Our Cyber Range courses are designed for this equipment.

 

Cyber range provides a complete and tested framework to help IT security organizations improve their overall security posture.  Used by companies and governments around the world, cyber ranges offer hyper-realistic simulated training and testing scenarios, which dramatically improve cyber security performance, while providing tools for simulating various network setups, attack scenarios, and traffic patterns.

https://cybersecurity-excellence-awards.com/wp-content/uploads/2017/12/686543
How are the courses different from others?
  • The courses are delivered by security professionals with solid security audit and assessments experiences.

  • These are practical, exercise courses, which show you how the attackers would attack in the real world, i.e. the entire kill-chain, and how to defend against them.

Who should attend

It is ideal for those working in positions such as:
  • Cyber Security Professionals looking to upskill their level of security operations proficiency
  • IT Professionals / Engineers looking to multi-skill themselves in cyber security operations or looking to take on a cyber-security related job role
  • System / Network Administrators requiring a better understanding of cyber security operations
  • Information Security Managers and Executives involved in cyber security operations
  • Project Managers, Risk Managers and Compliance Managers who require an understanding of cyber security operations processes and outcomes

Course Detail


  • Practical Web Defense

    Common web application vulnerabilities will be introduced and analysed with real life examples. The identification methodologies and prevention measures will be taught by our experienced instructors to help the enterprises defense against the threats.

    Skill Set Requirement
    Basic handling of manual scanning tools like nmap
    Knowledge of additional resources: IDS, etc.


    Day 1
    Introduction of Web Defense
    Day 2 - 3
    Exposure to Web attack method




  • Network Attacks Detection and Response

    As network attacks have been very common now, understanding their mechanism and knowing how to detect and response to it is essential to the cyber security of every enterprise. DDoS SYN flood, DNS Amplification attack and Man-in-the-middle attack will be taught in the hacker's perspective as well as the defender's perspective to equip the students with an all-rounded understanding of the attacks and prevention approaches.

    Skill Set Requirement
    Basic handling of firewall, Network forensics and Intrusion Detection tools like Checkpoint firewall, SNORT IDS and Arcsight Knowledge of additional resources: web app firewalls, Log Management etc.

    Day 1
    Introduction to Network based attack
    Day 2 - 3
    Intergrate the scenario of the attack methods




  • Data Leakage Defense

    The secret of the success of every enterprise lies in their confidential data. However, it could be vulnerable under the threat of SQL injection, DB Dump, FTP Exploit and Trojan that steal your data. To protect your enterprise against the pick-pockets, students will be armed with up-to-date detection techniques through readings and hands-on interactive analysis of real-world samples. Recovery and prevention methods will also be taught to ensure the hackers are hands-off from your confidential data.

    Skill Set Requirement
    Basic handling of firewall, Network forensics and Intrusion Detection tools like Checkpoint firewall, SNORT IDS and Arcsight Knowledge of additional resources: web app firewalls, educational web apps, OWASP, etc.

    Day 1
    Recognise on database attack methodology
    Day 2 - 3
    Illustrate the exploitation and protection on data leakage




  • Malware Detection and Recovery: Java Applet and Trojan

    Not all malwares could be easily detected before they have caused tangible loss to the company. Java Applet and Trojan are two good examples. To protect the companies against the threats, knowing how to detect them before it is too late has been an important step. Detection methodologies will be shared in the course together with the recovery as well as the prevention methods to save your day.

    Skill Set Requirement
    Basic handling of firewall, Network forensics and Intrusion Detection tools like Checkpoint firewall, SNORT IDS and Arcsight Knowledge of additional resources: web app firewalls.

    Day 1
    Introduction of Trojan detection
    Day 2 - 3
    Acquire a complete review of Trojan analyze




  • Malware Detection and Recovery: Ransomware and Worm

    Ransomware and Worm have threatened many enterprises by blocking access or draining the IT resources, therefore deteriorating the productivity and efficiency of the enterprises. Our course will introduce the mechanism of the malwares and the latest methods of detection and analysis to the students by real life examples. The introduction will be followed by the hands-on recovery procedures that help the enterprises resume their productivity.

    Skill Set Requirement
    Basic handling of firewall, Network forensics and Intrusion Detection tools like Checkpoint firewall, SNORT IDS and Arcsight Knowledge of additional resources: web app firewalls.

    Day 1
    Introduction of Ransomware and Worm detection
    Day 2 - 3
    Develop practical skillsets in Ransomware and Worm analyze





             Terms and Conditions