Advanced Cybersecurity for Institute Teachers

The objective of this course is to provide a global view of the different aspects that cybersecurity includes in order to identify them and learn to use the most appropriate tools in each of them:

  • Ethical hacking: Computer networks are susceptible to receiving computer attacks. Periodic network audits provide very important information about the level of security of the different assets available. We will see how security audits should be carried out and we will know the different tools that can help us carry them out.
  • Prevention and response: Bring the student to detection, prevention and response techniques for computer attacks. Currently, systems generate a large amount of data, being necessary to create environments that allow centralizing information to optimize the analysis. The aspects related to the centralization and management of security events will be worked on in order to proactively detect possible attacks.
  • Computer forensics: The detection, preservation and investigation of electronic evidence or evidence that can be used to defend the company against possible criminal liability is known as "computer forensics". We will try to understand the legal and technical aspects necessary to carry out a forensic analysis in a correct way and we will learn to obtain evidence in different working environments through a correct selection of tools.
  • Security in the development of applications: More than 80% of attacks on computer systems are made using vulnerabilities of web applications. It is therefore essential that developers have security knowledge and that this knowledge is integrated into the day to day of their work.

The course includes several guided practical exercises that help to consolidate the concepts presented during the sessions.

Previous knowledge of TCP / IP Networks is required as well as the use of Windows and Linux systems at an advanced user level.

The course lasts 32 hours, the delivery format will agree previously.

Contents 
  1. Ethical hacking
    1. Introduction and legal aspects
    2. Information gathering
    3. Scanning and identifying vulnerabilities
    4. Manual analysis
    5. Automated analysis
    6. Exploitation
  2. Cyber attacks: Prevention and response
    1. Infrastructure security
    2. Monitoring
    3. Answer (management of an incident)
  3. Computer forensics
    1. Introduction
    2. Obtaining evidence
    3. Analysis techniques and tools
  4. Security in the development of applications
    1. OWASP Top 10

 

Benefits for the students 

As a result of the training the participant will:

  • Become aware of the impact, risks and dangers of the internet to the organization.
  • Recognize the problems derived from computer vulnerabilities.
  • Recognize possible incidents and make use of the appropriate procedures to report security problems.
  • Develop the capacity to audit and detect the risks derived from computer threats in all types of organizations and contexts.
  • Develop the ability to understand and execute forensic analysis of systems, devices and networks.
  • Know the different types and methodologies of forensic analysis for effective practice with optimal results.
  • Know and know how to apply the main audit methodologies in computer security to determine security levels and keep systems protected at all times.
  • Know the main vulnerabilities in terms of computer security, its exploitation and post exploitation.
  • Detect and monitor different types of threats against servers and know good practices in the field.
  • Develop the ability to understand and monitor systems and networks to effectively detect different types of computer threats.
  • Know the main vulnerabilities that an application can have and know how to apply techniques to solve them.
To whom it is addressed 

Mainly to the institute teaching staff.

Follow us on

Els nostres articles del bloc d'inLab FIB

         
         

inLab FIB incorporates esCert

Icona ESCERT

First LogoCSIRT Logo

inLab is member of