Network Auditing Expert

curs_network_auditing

Computer networks are susceptible to computer attacks. Regular network audits provide very important information about the level of security of the various assets you have.

In this context, it is important to know the methodologies necessary to maintain protected systems at all times.

During the course, testing methods based on OSSTMM (Open Source Security Testing Methodology Manual) will be worked on, a security audit protocol at all levels: networks, telephony, presence, databases, servers, …

In the event that the student does not have knowledge of computer security, it is recommended that before taking this course, he completes the introductory course to Computer Security.

 

Network Auditing Expert

Contents

  1. Introduction
  2. Common Vulnerabilities
  3. Vulnerability management
  4. Information gathering
    • LAB 4.1: FOCA
  5. Network scan and enumeration
    • LAB 5.1: OpenVas
  6. Manual analysis
    • LAB 6.1: BadStore
  7. Exploitation of vulnerabilities
  8. Post-explotation

Benefits for the participant

  • Develop the ability to audit and detect risks arising from IT threats in all types of organizations and contexts.
  • Obtain the recognized Accreditation in Network Security Manager issued by the inLab FIB once the rest of the requirements have been met.
  • Know and know how to apply the main audit methodologies in IT security to determine security levels and keep systems protected at all times.
  • Know the main vulnerabilities in IT security, their exploitation and post-exploitation.
  • Acquire theoretical-practical knowledge highly valued by the market and ICT departments of all types of public and private organizations.

To whom it is addressed

  • IT security managers and technicians from ICT departments of all types of organizations who want to be up to date with the challenges posed by IT security auditing in a context of high vulnerability.
  • Computer Science or Telecommunications students who want to orient their career in the area of computer security.
  • Any professional who, meeting the minimum knowledge requirements, is interested in expanding their theoretical and practical knowledge in a subject of increasing importance such as Cybersecurity.