• Office Location HCJM+44 Muscat
  • Email info@aca.om
  • Phone +968 24990900 | +968 24990901

Cybersecurity – Secured Architectures

The security of information systems and network infrastructures is becoming more and more complicated nowadays.The deployed architectures use numerous software and hardware. To secure them properly, a large range of knowledge is required. The « Cybersecurity – Secured Architectures » course make you aware of vulnerabilities and action to perform for solution securization. The training methodology puts practice at the heart of learning to improve the acquisition of experience and knowledge. This training is based on the Best Practices recommended by official organisms (ANSSI, DGA-MI,NSA …)

Overview

Several hands-on exercises are performed through CYBELS Cyber Range platform, virtualizing information systems and reflecting realistic network architectures.
Each student has a pentester computer and their own IT System at their disposal on CYBELS Cyber Range.
He is able to access numerous equipment (PCs, routers, probes, firewalls, servers, proxies …).
The course also embeds feedback from Thales experience on Cybersecurity tools, devices, projects and solutions

Goals

After the course, the students know :

  • Secured architectures and solutions
  • Best practices for equipment configuration
  • Integrity control
  • Encryption solutions
  • Prevention solutions against intrusions
  • System and equipment hardening
  • The audit methodology and implementation
  • The essential rules for forensic investigation

Course Content

Security architectures and solutions
  • Security solutions and equipment
  • NOC and SOC Architectures
  • Implementation of DMZs
  • Firewall, probes, proxy, reversed-proxy, Honey pot...
Pentesting and attack tools and techniques
  • Acknowledgement, scanning, client and server exploitation
  • Tools Nmap, metasploit, armitage …
AAA (Authentication, Authorization, Accounting) Architecture
  • RADIUS, 802.1X protocols
  • SSO, OTP, Kerberos
Intrusion detection & Firewall
  • IDS probe implementation (Snort, suricata), HoneyPot
  • Attack detection and analysis
  • Network firewall (pfSense)
  • Application firewall (WAF)
Log analysis and relationship
  • SIEM
  • Supervision (SNMP, syslog)
  • Entirety control (Samhain)
  • Anti Virus
Encryption solutions
  • Encryption algorithm
  • PKI, certificate
  • IPSec protocol and Virtual Private Network (VPN)
System hardening & Security Audit
  • Linux, Windows OS, Network, WiFi
  • Vulnerability audit, forensics investigation

Schedule

Assessment

Prerequisites

This course is dedicated to people who are
familiar with :
  • IP Network and TCP / IP protocols
  • Windows systems
  • Unix / Linux systems
  • CyberSecurity (or have attended to the course « System vulnerabilities to cyberattacks »)


Recommended Prerequisites Courses



Complement Courses



Organization

  • 5 training days
  • Several hands-on exercises : 40 % Theory / 60 % Practice
  • 8 students maximum per session
  • Intermediate level


Location

ACA Main Building

Contacts

PO Box 74, Al-Khuwair
PC 133, Sultanate of Oman
+968 24990900 | +968 24990901