• Office Location HCJM+44 Muscat
  • Email info@aca.om
  • Phone +968 24990900 | +968 24990901

Cybersecurity – System vulnerabilities to cyber-attacks

The CyberSecurity - System vulnerabilities to cyber-attacks training course allows you to test and understand the main security breaches on networks and IT systems.
Its goal is to learn the cyber threats and use the common Ethical Hacking techniques in order to assess the impacts and to ensure a better protection on systems against cybercriminality.
The training methodology puts practice at the heart of learning to improve the acquisition of experience and knowledge.

Overview

Several hands-on exercises are performed through CYBELS Cyber Range platform, virtualizing information systems and reflecting realistic network architectures.
Each student has a pentester computer and their own IT System at their disposal on CYBELS Cyber Range.
He is able to access numerous equipment (PCs, routers, probes, firewalls, servers, proxies …).
The course also embeds feedback from Thales experience on Cybersecurity tools, devices, projects and solutions.

Goals

After the course, the students know :

  • The juridical aspects of cyberattacks
  • Networks penetration methods
  • Network scanning techniques
  • Techniques to assess vulnerabilities
  • Intrusion and attack methods
  • Network exploitation techniques
  • Password attack techniques
  • Web and WiFi attack techniques
  • Common hardening rules to apply

Course Content

Risks and Threats
  • Omani and/or International legislation
  • Attack techniques
Vulnerability scanning and analysis
  • Ethical hacking toolkit
  • Information acquisition/ Reconnaissance (lab)
  • Network architecture scanning (Nmap lab)
  • OS and Software scanning (lab)
  • Vulnerability scanning (Nessus lab)
IT and Network intrusion
  • Vulnerability exploitation (Metasploit lab)
  • Packet forging/ Fuzzing (Scapy lab)
  • WiFi networks intrusion (WEP, WPA, WPA2 labs)
  • Password and privilege escalation (brute force, dictionary attacks, Rainbow tables, MITM labs )
  • Intrusion in Web applications (XSRF, XSS, SQL injection, command injection labs)
Hardening Best practices
  • Audit
  • Countermeasures
  • Recommendations
  • Exchanges and data security
  • Architecture and operating system protection

Schedule

Assessment

Prerequisites

This course is dedicated to people without advanced experience in the domain of the Cybersecurity.
  • IP Network
  • TCP / IP protocols
  • Windows systems
  • Unix / Linux systems


Complement Courses



Organization

  • 5 training days
  • Several hands-on exercises : 50 % Theory / 50 % Practice
  • 8 students maximum per session
  • Intermediate level


Location

ACA Main Building

Contacts

PO Box 74, Al-Khuwair
PC 133, Sultanate of Oman
+968 24990900 | +968 24990901