Kurs:
Blue teamer I dio
Osnovni
40 časova
Materijali sa predavanja
Sertifikat o pohađanju kursa
Zašto ovaj kurs?
Na kursu polaznici će učiti o vrstama kibernetičkih napada i terminologiji kibernetičke bezbjednosti, uključujući vrste napada na mrežne protokole poput WEP, WPA, WPA2 i WPA3, kao i mogućnostima zaštite od tih napada.
Oblast zakona i usklađenosti obuhvata međunarodne zakone i regulative u vezi sa kibernetičkom bezbjednošću.
U okviru osnovnih mrežnih pojmova, kurs pokriva protokole i mrežne uređaje, uključujući TCP/IP protokole i rad različitih mrežnih uređaja. Polaznici će konfigurisati mrežne uređaje kao što su Mikrotik ruter i pfSense firewall, i upoznati se sa analizom mrežnog saobraćaja i logova, SIEM sistemima, obavještajnim podacima o prijetnjama i alatima za prikupljanje i analizu logova.
Za zaštitu mreža, polaznici će učiti o opremi i tehnologijama koje osiguravaju bezbjednost mrežnog saobraćaja i integritet mreže, uključujući sigurno konfigurisanje Wi-Fi mreža korišćenjem izolacije klijenata za javne mreže i RADIUS autentifikaciju sa sertifikatima. Takođe, konfigurisanje Snort IDS/IPS sistema je dio kursa.
U dijelu kursa posvećenom zaštiti Windows operativnog sistema, polaznici će instalirati i konfigurisati Active Directory (AD), primjenjivati sigurnosne kontrole zasnovane na JIT (just-in-time) i JEA (just-enough administration) konceptima, primijeniti mjere za jačanje Windows sistema (Windows hardening) i implementirati IIS, kao i virtualizaciju sistema i aplikacija.
Za zaštitu Linux operativnog sistema, polaznici će koristiti AppArmor i SELinux za jačanje Linux OS-a, automatizovati instalaciju i konfiguraciju Linux sistema uz pomoć Ansible-a, kao i primijeniti virtualizaciju sistema i aplikacija.

Kome je namijenjen ovaj kurs?
Blue Teamer I dio kursa namijenjen je polaznicima koji nemaju prethodnog znanja i iskustva kao administratori mreže i sistema i potrebno je da odslušaju cijeli kurs (Program obuke: Blue Teamer).
Kurs je osmišljen tako da se realizuje u dva odvojena termina, kako bi polaznicima bilo omogućeno dovoljno vremena da praktično primijene stečena znanja kroz rad na LAB-ovima između termina.
Preduslovi:
Tokom prvih pet dana kursa, polaznici će dobiti opštu sliku o temama, te za ovaj dio kursa nema specifičnih preduslova.
Napredno korišćenje operativnih sistema (Windows i Linux), razumijevanje IT infrastrukture i način na koji se različiti dijelovi infrastrukture povezuju i sarađuju je dodatna prednost.
Dodatna napomena:
Plan i program kursa:
1. Cyber attack types and terminology
Cyber attack types and terminology is the introductory module that explains the essential terminology used in cyber security, including the data states and the protections that can be used in each of them. Concepts of Blue/Red/Purple and Yellow/Orange/Green teams will be explained. Participants will also learn about Lockheed's Martin Cyber Kill chain, zero trust model and Software defined perimeter. There are some generic attacks being explained and some of them will be demonstrated here, such as MitM and RP spoofing, and with help of it sniffing of the clear text passwords, HTTPS MitM and SSL strip from the Network attacks, few Web application attacks from OWASP top 10 list, such as SQLi, OS command injection, XSS and Log4Shell vulnerability. Then the device attacks will be covered, such as attack on the Mikrotik router. In the OS and services attacks section we will demonstrate Attack on Windows by using a Print Nightmare vulnerability and attacking the Linux with misconfigured sudo privileges. Lastly, in the Client-side attacks section, attack on a client through vulnerable office and malicious office document will be demonstrated.
2. Law & compliance
Law & compliance module will cover UK laws and some laws from US, Australia and Russia including the problematic CLOUD act from US. NIS directive and GDPR will be covered too.
3. Networking basics
Networking basics module will cover TCP/IP suites of protocols, including the OSI and TCP/IP models, IPv4 and IPv4, and various protocols that exist on the TCP/IP stack, such as ARP, DNS, DHCP, SNMP, SMTP, FTP, TFTP, SSH, VoIP, etc. Participants will learn about the networking types, network topologies and network technologies. Additionally, cabling used to establish the interconnections between the network nodes, such as twisted pair, optical and coaxial, will be covered. This module concludes with networking devices, such as switches, routers, firewalls, IDS/IPS, etc., and software defined networking.
4. Securing networks
Securing networks module will emphasize the devices used to protect the network traffic and network itself, providing the participants with opportunity to acquire knowledge for configuring some of these components, such as routers and VLANS, Firewalls and Proxy servers, VPNs, IDS/IPS devices. In this module, the Dos/DDoS attacks will be discussed too, and participants will have the opportunity to try some of the DoS attacks against the infrastructure they will create during the lab part of the lectures.
5. Securing Windows OS and services
Securing Windows OS and services module will first cover the basics of Windows command prompt, terminal, and PowerShell, and then the Windows powerful security features will be reviewed, such as core strategies for administrative privileges, like PAM/JEA/JIT (Privileged Access Management/Just Enough Administration/Just in Time Administration), Windows Defender credential guard, LAPS, AppLocker, BitLocker, etc. Participants will also learn about password policies, account lockout policies, baselines and OS hardening by using CIS benchmarks, Windows patch management, Windows file permission basics, passwords and password protection and attacks, MFA and SSO, biometrics, AD basics, AD attacks, and Kerberos. OS and application virtualization on Windows will be covered as well, such as Hyper-V and docker/docker for desktop and remote access RDP. This module concludes by focusing on how to secure the boot process with trusted boot, ELAM (Early Launch Anti-Malware), Measured boot and TPM 2.0 which is the prerequisite for the Windows 11. Labs will cover many of the above-mentioned technologies.
6. Securing Linux OS and services
Securing Linux OS and services module covers the Bash basics, Linux boot process, Linux troubleshooting tools and Linux file permission basics including Linux ACLs. After this introduction, participants will learn about the Linux passwords, and Linux security features, such as AppArmor, SELinux, seccomp, cgroups and chroot. Next, Linux kernel firewall iptables will be reviewed, with some examples on how to use it during various troubleshooting steps. Participants will also learn about the Linux patching techniques, and how to harden Linux OS. Besides that, Linux OS and application virtualization will be reviewed, such as KVM, XEN, Citrix hypervisor, QEMU, and VMware ESXi (ESXi is NOT a Linux distribution as per VMware, even though it is using some of the same core commands). Within this module, docker will be further discussed. This module concludes by providing the introduction into the auditing and centralized logging like rsyslog, auditd, and 3rd party tools like ELK and Splunk, since these tools will be reviewed in more details during the 2nd week of the training.
1900,00 KM
Cijena je bez PDV-a.
Cilj kursa je da naučiš
Vrste cyber napada i terminologije
Koncept DoS/DDoS i opcija za njihovo ublažavanje
Razumijevanje Windows alatki koje se mogu koristiti za implementaciju bezbjednih i ojačanih sistema
Razumijevanje Linux alatki koje se mogu koristiti za implementaciju bezbjednih i ojačanih sistema
Razumijevanje značaja upravljanja rizicima u informacionoj i računarskoj bezbjednosti
Šta dobijam?
Pristup kursu u trajanju od 80 časova
Materijale sa predavanja
Sertifikat o pohađanju kursa
Detaljne informacije
Veljka Mlađenovića bb
Banja Luka
(krug Poslovne zone Incel)


