TRAINING PROGRAMME
Network Security Assessment
Attackers often take advantage of vulnerabilities in routers, wireless access point, firewalls, DNS, web and database servers, and other systems to gain access to the internal network of organization. Therefore, organization must secure their network infrastructure to mitigate risk from within and outside the network by conducting network security assessment.
- Understand the methodology and components in building secured network architecture
- Learn network data flow
- Identify industry best practices on secured network architecture
- Understand the methodology used in conducting network security assessment and wireless network security
- Identify common vulnerabilities found under network infrastructure and ways to mitigate these vulnerabilities.
- Identify hands-on network security assessment using mostly open source distributions tools
- Management, Administrator, IT Security personnel who are in charge of security in their organization
- Related personnel or individuals who are interested to understand and learn with technical hands-on about network security assessment
Security Posture Assessment
- Introduction to Network Security
- Overview of Network Security Assessment Methodologies
- Vulnerability Investigation and Exploitation
- Common Vulnerabilities Found in Network Infrastructure and Mitigation
- Hands-on Activity
- Introduction to Wireshark
- Wireshark Functions
- Wireshark GUI
- Packet Capture
- Exploitation Fundamentals
- Client-Side Exploits
- Service-Side Exploits
- Local Exploits
- Attacks and Defenses
- Exploiting System
- Password Attacks
- Introduction
- Information Gathering
- Active/Passive Scanning
- Wardriving
- Penetration Testing
Encryption Cracking - Vulnerabilities Testing
- Attacks Execution
- Sniffing
- Data/Traffics Analyzing
Packets Analyzing
En. Muhammad Arman Bin Selamat
Analyst
Malaysian Vulnerability Assessment Centre (MyVAC)
Muhammad Arman Bin Selamat is an information security analyst with extensive experiences in Web Application, Network and Computer Security. He has worked with various public and private sector as IT Executive and then served with CyberSecurity Malaysia as an IT Analyst since March 2008.
He has strong technical background and is good team player. He is highly motivated and has excellent analytical, decision making and problem-solving skills. He possesses expertise in programming using ASP, PHP, VB6 & VB.NET. He has an expertise on Web Application Security, Network Security and Host Security.
He also developed and delivered training for a wide range of government bodies and organizations to meet client needs. Through CyberSecurity Malaysia he hopes to support organizations in securing their network to achieve confidentiality, integrity and availability (CIA).
- The training program is currently unavailable
12 CPD Point
Please submit the Certificate of Completion to Global ACE Certification at www.globalace.org
Have any inquiries? Check out the FAQ