facebook

Kurs:

Blue teamer I dio

Osnovni

40 časova

Materijali sa predavanja

Sertifikat o pohađanju kursa

Zašto ovaj kurs?

Na kursu polaznici će učiti o vrstama kibernetičkih napada i terminologiji kibernetičke bezbjednosti, uključujući vrste napada na mrežne protokole poput WEP, WPA, WPA2 i WPA3, kao i mogućnostima zaštite od tih napada.

Oblast zakona i usklađenosti obuhvata međunarodne zakone i regulative u vezi sa kibernetičkom bezbjednošću.

U okviru osnovnih mrežnih pojmova, kurs pokriva protokole i mrežne uređaje, uključujući TCP/IP protokole i rad različitih mrežnih uređaja. Polaznici će konfigurisati mrežne uređaje kao što su Mikrotik ruter i pfSense firewall, i upoznati se sa analizom mrežnog saobraćaja i logova, SIEM sistemima, obavještajnim podacima o prijetnjama i alatima za prikupljanje i analizu logova.

Za zaštitu mreža, polaznici će učiti o opremi i tehnologijama koje osiguravaju bezbjednost mrežnog saobraćaja i integritet mreže, uključujući sigurno konfigurisanje Wi-Fi mreža korišćenjem izolacije klijenata za javne mreže i RADIUS autentifikaciju sa sertifikatima. Takođe, konfigurisanje Snort IDS/IPS sistema je dio kursa.

U dijelu kursa posvećenom zaštiti Windows operativnog sistema, polaznici će instalirati i konfigurisati Active Directory (AD), primjenjivati sigurnosne kontrole zasnovane na JIT (just-in-time) i JEA (just-enough administration) konceptima, primijeniti mjere za jačanje Windows sistema (Windows hardening) i implementirati IIS, kao i virtualizaciju sistema i aplikacija.

Za zaštitu Linux operativnog sistema, polaznici će koristiti AppArmor i SELinux za jačanje Linux OS-a, automatizovati instalaciju i konfiguraciju Linux sistema uz pomoć Ansible-a, kao i primijeniti virtualizaciju sistema i aplikacija.

Sigurnost Web Aplikacija

Kome je namijenjen ovaj kurs?

Blue Teamer I dio kursa namijenjen je polaznicima koji nemaju prethodnog znanja i iskustva kao administratori mreže i sistema i potrebno je da odslušaju cijeli kurs (Program obuke: Blue Teamer).

Kurs je osmišljen tako da se realizuje u dva odvojena termina, kako bi polaznicima bilo omogućeno dovoljno vremena da praktično primijene stečena znanja kroz rad na LAB-ovima između termina.

Preduslovi:

Tokom prvih pet dana kursa, polaznici će dobiti opštu sliku o temama, te za ovaj dio kursa nema specifičnih preduslova.

Napredno korišćenje operativnih sistema (Windows i Linux), razumijevanje IT infrastrukture i način na koji se različiti dijelovi infrastrukture povezuju i sarađuju je dodatna prednost.

Dodatna napomena: 

Ovaj kurs nije moguće pohađati online.

Plan i program kursa:

1. Cyber attack types and terminology

Cyber attack types and terminology is the introductory module that explains the essential terminology used in cyber security, including the data states and the protections that can be used in each of them. Concepts of Blue/Red/Purple and Yellow/Orange/Green teams will be explained. Participants will also learn about Lockheed's Martin Cyber Kill chain, zero trust model and Software defined perimeter. There are some generic attacks being explained and some of them will be demonstrated here, such as MitM and RP spoofing, and with help of it sniffing of the clear text passwords, HTTPS MitM and SSL strip from the Network attacks, few Web application attacks from OWASP top 10 list, such as SQLi, OS command injection, XSS and Log4Shell vulnerability. Then the device attacks will be covered, such as attack on the Mikrotik router. In the OS and services attacks section we will demonstrate Attack on Windows by using a Print Nightmare vulnerability and attacking the Linux with misconfigured sudo privileges. Lastly, in the Client-side attacks section, attack on a client through vulnerable office and malicious office document will be demonstrated.

2. Law & compliance

Law & compliance module will cover UK laws and some laws from US, Australia and Russia including the problematic CLOUD act from US. NIS directive and GDPR will be covered too.

3. Networking basics

Networking basics module will cover TCP/IP suites of protocols, including the OSI and TCP/IP models, IPv4 and IPv4, and various protocols that exist on the TCP/IP stack, such as ARP, DNS, DHCP, SNMP, SMTP, FTP, TFTP, SSH, VoIP, etc. Participants will learn about the networking types, network topologies and network technologies. Additionally, cabling used to establish the interconnections between the network nodes, such as twisted pair, optical and coaxial, will be covered. This module concludes with networking devices, such as switches, routers, firewalls, IDS/IPS, etc., and software defined networking.

4. Securing networks

Securing networks module will emphasize the devices used to protect the network traffic and network itself, providing the participants with opportunity to acquire knowledge for configuring some of these components, such as routers and VLANS, Firewalls and Proxy servers, VPNs, IDS/IPS devices. In this module, the Dos/DDoS attacks will be discussed too, and participants will have the opportunity to try some of the DoS attacks against the infrastructure they will create during the lab part of the lectures.

5. Securing Windows OS and services

Securing Windows OS and services module will first cover the basics of Windows command prompt, terminal, and PowerShell, and then the Windows powerful security features will be reviewed, such as core strategies for administrative privileges, like PAM/JEA/JIT (Privileged Access Management/Just Enough Administration/Just in Time Administration), Windows Defender credential guard, LAPS, AppLocker, BitLocker, etc. Participants will also learn about password policies, account lockout policies, baselines and OS hardening by using CIS benchmarks, Windows patch management, Windows file permission basics, passwords and password protection and attacks, MFA and SSO, biometrics, AD basics, AD attacks, and Kerberos. OS and application virtualization on Windows will be covered as well, such as Hyper-V and docker/docker for desktop and remote access RDP. This module concludes by focusing on how to secure the boot process with trusted boot, ELAM (Early Launch Anti-Malware), Measured boot and TPM 2.0 which is the prerequisite for the Windows 11. Labs will cover many of the above-mentioned technologies.

6. Securing Linux OS and services

Securing Linux OS and services module covers the Bash basics, Linux boot process, Linux troubleshooting tools and Linux file permission basics including Linux ACLs. After this introduction, participants will learn about the Linux passwords, and Linux security features, such as AppArmor, SELinux, seccomp, cgroups and chroot. Next, Linux kernel firewall iptables will be reviewed, with some examples on how to use it during various troubleshooting steps. Participants will also learn about the Linux patching techniques, and how to harden Linux OS. Besides that, Linux OS and application virtualization will be reviewed, such as KVM, XEN, Citrix hypervisor, QEMU, and VMware ESXi (ESXi is NOT a Linux distribution as per VMware, even though it is using some of the same core commands). Within this module, docker will be further discussed. This module concludes by providing the introduction into the auditing and centralized logging like rsyslog, auditd, and 3rd party tools like ELK and Splunk, since these tools will be reviewed in more details during the 2nd week of the training.

1900,00 KM

    Preferirani način praćenja kursa


    *Ukoliko nemate promo kod ostavite prazno polje.

    Cijena je bez PDV-a.

    Cilj kursa je da naučiš

    R

    Vrste cyber napada i terminologije

    R

    Koncept DoS/DDoS i opcija za njihovo ublažavanje

    R

    Razumijevanje Windows alatki koje se mogu koristiti za implementaciju bezbjednih i ojačanih sistema

    R

    Razumijevanje Linux alatki koje se mogu koristiti za implementaciju bezbjednih i ojačanih sistema

    R

    Razumijevanje značaja upravljanja rizicima u informacionoj i računarskoj bezbjednosti

    Šta dobijam?

    Pristup kursu u trajanju od 80 časova

    Materijale sa predavanja

    Sertifikat o pohađanju kursa

    Detaljne informacije

    Početak:
    -
    Kraj:
    -
    pon
    uto
    sri
    čet
    pet
    08:00-16:00
    40 časova
    LANACO Tehnološki centar
    Veljka Mlađenovića bb
    Banja Luka
    (krug Poslovne zone Incel)
    Nemogućnost praćenja online

    Možda te zanima

    Ništa nije pronađeno
    Share This