Over the years, the magnitude of the damage of cybercrime in the world has been revealed. The theft of billions of dollars of information, the irreversible damage to organizations, the damage to the reliability of systems, and the damage will increase as computing dependence grows.
Together with the ever-increasing threat, organizations around the world are looking for people who can protect their trade secret, their customers and, if necessary, understand what damage was done in the event of an attack. The profile of these people is high technical ability, a desire to learn and improve together with familiarity with the world of attack and defense, a defense tool and the ability to respond quickly.
The program implements cyber protection as a practical course that gives people with high technical ability the tools required to significantly improve organizational protection. The course includes challenges that participants will face when they look for work in industry. The course is a vast knowledge base for the participant who wishes to enter the information security market.
The Course includes preparation for exams and certification from Israel's National Cyber Bureau in the field of Cyber Protection Implementer.
The course is also intended for participants who arrive without prior knowledge or background in the field.
Introduction
Information Security - Cyberspace, Attack vectors, Defense mythologies, Information security rolesHardware - Computer hardware, Hardware for information security (Writeblocks, HD Readers etc.)Windows 10 - Control Panel, Permissions, Shares, Event ViewerInfrastructure
Active Directory - Users & Groups management, services, GPO, SMB, LLMNR, NetBIOSServers - DNS, ESX, Storage, Web (General)Database - SQL, Big data, JSONOperation Systems
Windows - Registry, WMI, NTFS, Memory, Processes, DLL & PE, Windows Architecture, Hooking, Buffer OverflowLinux - Commands, Users & Groups management, Services, Boot, File system, Logs etcEnd point security - Client hardening, AV, HIPS, Application controlAndroid - Services, PermissionsIOS - Services, PermissionsIdentity And Access Management
Physical and logical assets controlIdentification and authentication of people and devicesIdentity as a service and Third-party identity servicesAccess control attacksNetwork & Endpoint Security
Removable DevicesNetwork - Firewall, IDS, IPSBehavioral analysis solutionsDLPAccess Control methodologyDevelopment (Software Development Security)
Python - Basics, Debug, Exceptions, Regular expression, Data processing, ScapySecure development lifecycle - Methods, Standardization. Code obfuscation, Anti reverseDevelopment environment security controlsSoftware security effectivenessAcquired software security impactNetworking
Basic - OSI, TCP/IP, Packet Tracer & IOS, Network componentsNetwork attacks - Understand network flooding, Poisoning, SpoofingNetwork analysis - Wireshark, Firewall, IPS/IDS, Application filters, Reconnaissance, WirelessSecure network architecture design (e.g. IP and non-IP protocols, segmentation)Secure communication channelsNetwork security - VPN, Proxy, TunnelingSniffing, Packet Sniffers, Pcap & WinPcap, Wireshark, Active Sniffing MethodsRouting Protocols AnalysisFirewall & IDSEncryption
Signature - Understanding Hash, MD5, Sha1, Sha 256, Digital signatureEncryption methods - Key management, Protocols, RSA, Diffie Helman, KerberosWeb
Basic - HTML, JavaScript, PHP, HTTP, WebsocketsWeb vulnerabilities - OWASP top 10, SQL mappingWeb security - WAF, Secure modules and methodsCloud - Architecture, Cloud protectionForensics & Malware Analysis
HD analysis - Data gathering, Forensics methods, ArtifactsMemory analysis - Memory architecture, Memory gathering, VolatilityMalware analysis - Basic static analysis, Basic dynamic analysis, sandboxesReverse Engineering - Assembly, IDA ProSecurity Operations
Investigations support and requirementsLogging and monitoring activitiesProvisioning of resources and Resource protection techniquesIncident management and Preventative measuresPatch and vulnerability managementDisaster recovery processes and plansPhysical security and Personnel safety concernsSecurity And Risk Management
Confidentiality, integrity, and availability conceptsSecurity governance principlesProfessional ethicSecurity policies, standards, procedures and guidelinesBackup and DR processesLaws
Privacy - Privacy issuesRegulations - StandardizationLaw - Laws and governance decisionsCompliance methodsSecurity methodologies - ITIL, COBTAudit - Auditing processAsset Security
Ownership (e.g. data owners, system owners)Information and asset classificationData security controlsAppropriate retention