Introductions
Security Auditing, Attacks, and Threat Analysis teaches you how to conduct a security audit. It teaches you how to perform the different phases of an audit, including discovery and penetration. You will also learn how to prevent hackers from controlling your network, and how to generate effective audit reports that can help organizations improve their security and become current with industry security standards. Finally, you will learn about how to recommend industry-standard security solutions for your enterprise. As you examine different threats and learn more about how network hosts participate on a network, you will determine how to assess and manage the risk posed to each system.
This course introduces various tools to help you in the auditing process; you will use some of these tools in the labs. You will also study international standards, along with time-tested methods for auditing a network efficiently. After completing this course, you will have in-depth training and experience in analyzing the hacker process and associated methodologies. You will be able to counteract attacks using specific, practical tools, including enterprise-grade security-scanning and intrusion-detection programs. You will also learn how to analyze. Your findings and make recommendations for establishing the best security possible in a given scenario.
Prerequisites
Students must have completed Network Security and Firewalls or be able to demonstrate equivalent Internet knowledge.
Nbiz Infosol provides this course in UAE specifically in Abu Dhabi, Dubai, Ajman, RAK, Al Ain, Umm Al Quwain and other areas
Course Objectives
After completing this class, you will be able to:
- Describe security auditing principles, identify a security auditor's chief duties and assess networkrisk factors.
- Describe the security auditing and discovery processes, plan an audit and install and configure network-based and host-based discovery software.
- Describe penetration strategies and methods, including listing potential attacks.
- Establish a baseline for user activities, conduct log analysis and implement auditing for various activities.
- Suggest ways to improve compliance to a security policy and create an assessment report. Install operating system add-ons, such as personal firewalls, and implement native auditing.
Duration & Learning Level
Learning Level: Intermediate
Duration: 3 day(s)-
<<Back to schedule | |||
Training Provider | Nbiz Infosol | Course Name | |
Candidate Name * | Company Name | ||
Student Type | Student Type ID | ||
Student ID Number | Mobile # * | ||
Email* | Registration Ref | ||
Name of Course | Scheduled Dates | Venue | Registration Link |
Security Auditing,Attacks and Threat Analysis | To be determined | Abu Dhabi, UAE | Register Now »» |
Security Auditing,Attacks and Threat Analysis | To be determined | Chennai, India | Register Now »» |
Security Auditing,Attacks and Threat Analysis | To be determined | Cairo, Egypt | Register Now »» |
Security Auditing,Attacks and Threat Analysis | To be determined | Dubai, UAE | Register Now »» |
Security Auditing,Attacks and Threat Analysis | To be determined | Jeddah, Suadi Arabia | Register Now »» |
Security Auditing,Attacks and Threat Analysis | To be determined | Riyadh, Saudi Arabia | Register Now »» |
Security Auditing,Attacks and Threat Analysis | To be determined | Muscat, Oman | Register Now »» |
Security Auditing,Attacks and Threat Analysis | To be determined | Baghdad, Iraq | Register Now »» |
Security Auditing, Attacks and Threat Analysis | To be determined | Kuwait City, Kuwait | Register Now »» |
Security Auditing, Attacks and Threat Analysis | To be determined | Manama, Bahrain | Register Now »» |
Security Auditing, Attacks and Threat Analysis | To be determined | Beirut, Lebanon | Register Now »» |
Security Auditing, Attacks and Threat Analysis | To be determined | Abu Dhabi, UAE | Register Now »» |
Security Auditing, Attacks and Threat Analysis | To be determined | Abu Dhabi, UAE | Register Now »» |
Nbiz delivers this course in Abu Dhabi, Dubai, RAK, Ajman, Sharjah, Kuwait, Oman, Saudi, Bahrain , egypt and other places in the UAE and in the Middle East
Discussion on the Security auditing, discovery methods and control phase. Auditing Server Penetration and Attack Techniques. Intrusion Detection with Auditing and Log Analysis. We enable our participants to perform on the different phases of a security audit. Emphasizing on the discovery and penetration. Preventing unauthorized users from controlling organization networks. Participants will also learn how to generate effective audit reports that can help organizations. Improvements on their security and become current with industry security standards.
Security Auditing
- Introduction to Auditing
- What Is an Auditor?
- What Does an Auditor Do?
- Auditor Roles and Perspectives
- Conducting a Risk Assessment
- Risk Assessment Stages
Discovery Methods
- Discovery
- Security Scans
- Enterprise-grade Auditing Applications
- Social Engineering
- What Information Can You Obtain?
Auditing Server Penetration and Attack Techniques
- Network Penetration
- Attack Signatures and Auditing
- Compromising Services
- Common Targets
- Routers
- Databases
- Web and FTP Servers
- E-mail Servers
- Naming Services
- Auditing for System Bugs
- Auditing Trap Doors and Root Kits
- Auditing Denial-Of-Service Attacks
- Combining Attack Strategies
- Denial of Service and the TCP/IP Stack
Security Auditing and the Control Phase
- Network Control
- Control Phase Goals
- UNIX Password File Locations
- Control Methods
- Auditing and the Control Phase
Intrusion Detection
- What Is Intrusion Detection?
- IDS Applications and Auditing
- Intrusion Detection Architecture
- IDS Rules
- IDS Actions
- False Positives
- Intrusion-Detection Software
- Purchasing an IDS
- Auditing with an IDS
Auditing and Log Analysis
- Log Analysis
- Baseline Creation
- Firewall and Router Logs
- Operating System Logs
- Filtering Logs
- Suspicious Activity
- Additional Logs
- Log Storage
- Auditing and Performance Degradation
Audit Results
- Auditing Recommendations
- Creating the Audit Report
- Improving Compliance
- Improving Router Security
- Enabling Proactive Detection
- Host Auditing Solutions
- Replacing and Updating Services
- Secure Shell (SSH)
- SSH and DNS
This is an advanced learning level course which consists of a 12-hours duration.
The participant will be entitled for a certification of Certified Security Specialist.
1. How do I enroll/register for the training course?
To enroll or register to any training course, you can use the registration page from training page or fill the request a call back form from each course pages.
The following page will provide you a list of course and training that we are providing based on the category and from each course item you can see the course details.
URL: http://www.nbizinfosol.com/training.aspx
Another method is to fill a Request a call back form provided in each Training/Course pages.
2. What will I get along with this training?
We are providing course materials during training and completion certificate after succesful training.
3. Do I need to fill up a registration form?
Yes. you can fill the registration form avaialble in the website or you can directly call us to enroll the course.Our executives will guide you to do further steps.
4. Does the course fees include the examination fee as well?
Based upon the course you are enrolling, we will charge the exam fee . We will give you the details of course fee and exam fee anytime to clear it.
5. Do you provide any course completion certificate?
Yes. We are providing the Course completion certificate for all courses we are providing.
6. Do you provide assistance for the exam appliation process?
Yes. We will provide assistance and support to apply for any exam.
7. What is the mode of payment?
Two types of payment available:
1. Visit our office and pay direct,You are always welcome to Nbizinfosol.
2. We are providing online payment via paypal payment gateway.Based upon your request we will provide the link to access the payment page.
Network Server Administrators Firewall Administrators System Administrators Application Developers IT Security Officers
Note: The listed information (venue, schedule, duration and content) may be modified and customized as per the requirements.