Events & Seminars
Press releases, newsletters, events & seminars all in one place.
BUILDING CYBER WARRIOR 2015:
Improving Network Defense & Security Readiness
Cyber Security Malaysia Awards, Conferences & Exhibition (CSM-ACE) 2015
21 & 22 October 2015 at Pullman Putrajaya Lakeside
The traditional method has failed. We have seen ongoing rapid cyberattacks hitting our infrastructure and damage our cyberspace every day. The lack of skills and confidence to operate sophisticated tools, poor networking and security knowledge in critical areas are vulnerabilities to the ever increasing problem. The situation gets worse when most network and applications are susceptible to the threat too.
Network Forensics, Security and Trouble-shooting analysis require skills to not only capture suspicious data but also to discern unusual patterns hidden within seemingly normal network traffic. This hands-on training offer participants the required skills to perform the analysis beginning with the core tasks and techniques for TCP/IP analysis, TCP/UDP, DNS, ARP, DHCP, HTTP, ICMP etc.
This hands-on training will also equip the participants with set of investigative techniques focusing on security threat recognition for a variety of network attacks and exploit scenarios. This includes network reconnaissance, Bot-Net threat recognition, man-in-the-middle attacks, as well as common user vulnerabilities in IP-related protocols.
Resolving network, security and application performance problems today require a solid understanding of packets - which every IT professionals should develop. We will dig into why so many problems are rooted inside packets, how to spot them and show a few real case studies. We will achieve this by illustrating a set of analysis techniques to spot and visualize location of the source of the problems.
Train like you fight. This course is aimed at any IT professionals (Network, Security & Applications) who want to be next generation of Cyber Warriors. To become a Cyber Warrior, you need to have a rock solid experience in building networks, defending networks and operating in cyberspace with full spectrum of capabilities.
- Network Analysis Overview
- Wireshark Functionality Overview
- Capturing Wired and Wireless Traffic
- TCP/IP Analysis Overview
- Analyze Common TCP/IP Traffic Patterns
- Network Forensics Fundamental
- Detect Scanning and Discovery Process
- Analyze Suspect Traffics
- Preparing for The Problem
- Setting Up Your Troubleshooting Profile for Faster Analysis
- Visualising and Traffic Correlation Using Wireshark
- Best Practise of Troubleshooting Your Network (Infrastructure, Security and Application)
Who Should Attend
This course will significantly benefit Network Engineer, Network Security Engineer, Network Administrator, IT Security Officers, Auditors, Security Professionals, Web Administrators and anyone who is concerned about IT Security.
Two consecutive days starting from October 21, 2015 to October 22, 2015, including 2 x tea breaks and 1 x lunch for each day.
- REGISTERED ATTENDEES/INVITEES
this event has
To make/arrange payment, please call 603.8992.6888 or e-mail your interest to email@example.com.
- Event Flyer/Brochure (Type: PDF, Size:4.153MB)