Range Workshop

 

In the current cyber threat landscape, knowledge is important but always in‐sufficient. In order to keep an organization secure, you and your team are required to equip with the right skillsets and competencies. Our Range Workshop courses are designed for this equipment.

Who Should Attend

The Range Workshop is best suited for:

  • IT Professionals / Engineers looking to multi-skill themselves in cyber security operations
  • System / Network Administrators requiring a better understanding of cyber security operations
  • Information Security Managers and Executives involved in cyber security operations

Range Workshop Outline


  • Protect from DDoS Attack

    After the training, the trainee will understand how DDoS occurs and how to response when a DDoS incident occurs.

    Skill Set Requirement
    ▪ Basic Windows forensics
    ▪ Basic knowledge on firewall (Checkpoint preferred)
    ▪ Basic network forensics
    ▪ Basic knowledge on Packet sniffing
    ▪ Basic knowledge on DNS Server


    What can be learned:

    • Practicing networking forensics
    • Hands-on experience on SNORT IDS
    • Hands-on experience with a classic DDoS event

    Course Content Highlight:

    • What is DDoS
    • Common DDoS Attacks
    • Workshop Tools hands-on
    • DDoS Attack Workshop
    • Debrief after workshop
    • How to prevent this incident occurs


  • Protect from Database Attack

    After the training, the trainee will understand what exactly SQL injection is and how to response when a SQL Injection incident occurs.

    Skill Set Requirement
    ▪ Basic knowledge on database server management (MSSQL preferred)
    ▪ Basic knowledge on firewall (Checkpoint preferred)
    ▪ Basic network forensics
    ▪ Basic knowledge of server log



    What can be learned:

    • Practicing networking forensics
    • Hands-on experience on SNORT IDS
    • Hands-on experience with a classic DDoS event

    Course Content Highlight:

    • Common Database Attacks
    • Type of SQL Injections
    • Workshop Tools hands-on
    • SQL Injection Workshop
    • Debrief after workshop
    • How to prevent SQL Injections


  • Protect from Ransomware Attack

    After the training, the trainee will understand what Ransomware is and how to response when a Ransomware incident occurs.

    Skill Set Requirement
    ▪ Basic Windows forensics
    ▪ Basic knowledge on firewall (Checkpoint preferred)
    ▪ Basic network forensics
    ▪ Basic knowledge on Powershell


    What can be learned:

    • Practicing Windows research and basic forensics
    • Hands-on experience on reverse engineering
    • Hands-on experience with a Ransomware event

    Course Content Highlight:

    • What is Ransomware
    • Common ways for Ransomware Attacks
    • Workshop Tools hands-on
    • Ransomware Attack Workshop
    • Debrief after workshop
    • How to prevent this incident occurs


  • Protect from Trojan Attack

    After the training, the trainee will understand what Trojan is and how to response when a Trojan incident occurs.

    Skill Set Requirement
    ▪ Basic knowledge on Windows log management
    ▪ Basic knowledge on Email Server (Sendmail preferred)
    ▪ Basic knowledge on firewall (Checkpoint preferred)
    ▪ Basic network forensics
    ▪ Basic knowledge on Windows Scripting


    What can be learned:

    • Practicing Linux research and basic forensics related to Trojan
    • Hands-on experience with Windows, Sendmail server and Windows scripting
    • Practicing mail services analysis and forensics

    Course Content Highlight:

    • Type of Trojans
    • Common ways for Trojan Attacks
    • Workshop Tools hands-on
    • Trojan Attack Workshop
    • Debrief after workshop
    • How to prevent this incident occurs


  • Protect from Web App Attack

    After the training, the trainee will understand how a hacker can modify your web application and how to response when this incident occurs.

    Skill Set Requirement
    ▪ Basic knowledge on Linux log management
    ▪ Basic knowledge on Apache Web Server
    ▪ Basic knowledge on firewall (Checkpoint preferred)
    ▪ Basic network forensics


    What can be learned:

    • Practicing Linux and Apache server logging research and basic forensics related to Web Server
    • Hands-on experience with Apache, SSH client and Linux management tools
    • Hands-on experience with a Web defacement attack event

    Course Content Highlight:

    • Linux and Apache security review
    • Common attack flow
    • Workshop Tools hands-on
    • Web Defacement Workshop
    • Debrief after workshop
    • How to prevent this incident occurs

  • Protect from Web Server Attack

    After the training, the trainee will understand how the hackers can attack your web server and how to response when this type of incident occurs.

    Skill Set Requirement
    ▪ Basic knowledge on Linux log management
    ▪ Basic knowledge on Apache Web Server
    ▪ Basic knowledge on firewall (Checkpoint preferred)
    ▪ Basic network forensics


    What can be learned:

    • Practicing Linux and Apache server logging research and basic forensics related to Web Server
    • Hands-on experience with Apache, SSH client and Linux management tools
    • Hands-on experience with a brute-force attack event

    Course Content Highlight:

    • Linux and Apache security review
    • Common attack flow
    • Workshop Tools hands-on
    • Apache Server Shutdown Workshop
    • Debrief after workshop
    • How to prevent this incident occurs


    • Duration: 1 days
    • Candidates required to bring his/her laptop: No
    • Participants will be awarded a certificate of attendance.


             Terms and Conditions