Skip to content Skip to footer

Advanced Cyber Security

ADVANCED

CYBER
SECURITY

A COURSE BY INFORMATION SECURITY EXPERT, SRIDHAR K

Get an in-depth understanding of Cyber Security. Familiarise yourself with the threats and their assessment, setting-up controls and a defensive framework, establishments of tools and processes and apply them in a virtual simulated environment.

COURSE STRUCTURE

Understand security fundamentals, SIEM and Networking 101
The how and why of robust tools and processes to protect assets
Detailed walkthrough on technologies involved in threat assessment
Training through CyberRange - deep-dive experience in Cyber Security
Set up controls to protect against attacks. Risk-based approach.
Written tests, practical exercises, and peer reviews to evaluate participants’ overall performance
Sridhar K is a Senior Technology Professional with more than two decades of experience in Secure Architecture, Compliance and Standard development.

Discovery – The Threat Landscape – Week 1

Prerequisites: Understanding of fundamentals of Computing and have familiarity with concepts in Information Security

  1. Security Fundamentals
  2. Introduction to Emails and Phishing
  3. Introduction to Threat Intelligence
  4. Introduction to Digital Forensics
  5. Introduction to SIEM
  6. Introduction to Incident Response
  7. Networking 101

Assessment

Detailed walkthrough on technologies involved to get a base on how to collect and make the techniques available to the investigator and take actions to preserve and investigate incidents)

  1. Security Controls
  2. Types of Phishing Emails
  3. Threat Actors and APTs
  4. Analysing URLs, Attachments, and Artifacts
  5. Tactics and Techniques Used
  6. Digital Evidence Collection
  7. Windows Investigations
  8. Linux Investigations

Research

Now that the details of attacks have been understood it is necessary to have in place a set of controls to protect against such attacks. Provides a general framework of defensive measures that are applicable across technology and human landscapes. Provides a risk based approach to protection.

  1. Taking Defensive Measures
  2. Management Principles
  3. Phishing Response Challenge
  4. Operational Threat Intelligence
  5. Tactical Threat Intelligence
  6. Strategic Threat Intelligence
  7. Malware and Global Campaigns
  8. Volatility

Execution Framework

Now that the details of attacks have been understood it is necessary to have in place a set of controls to protect against such attacks. Provides a general framework of defensive measures that are applicable across technology and human landscapes. Provides a risk based approach to protection.

  1. Correlation
  2. Using SIEM
  3. Detection and Analysis Phase
  4. Containment, Eradication, and Recovery Phase
  5. Lessons Learned
  6. MITRE ATT&CK

CyberRange Exercise

A typical CyberRange exercise for two days would involve the following activities:

  1. Introduction to CyberRange and its components
  2. Setting up the CyberRange environment
  3. Exploring the CyberRange environment
  4. Exploring the different attack scenarios
  5. Exploring the different defensive scenarios
  6. Exploring the different attack scenarios
  7. Exploring the different defensive scenarios
  8. Practicing attack and Défense scenarios
  9. Evaluating the results of the attack and Défense scenarios
  10. Debriefing and discussing the results of the exercise
  11. Exploring the different attack scenarios and practicing them.
  12. Exploring the different defensive scenarios and practicing them.
  13. Working through a series of attack and Défense scenarios.
  14. Evaluating the results of the attack and Défense scenarios.
  15. Debriefing and discussing the results of the exercise.

Typical incidents that can be created in a CyberRange exercise include:

  1. Malware attacks
  2. Phishing attacks
  3. Denial of Service attacks
  4. Data exfiltration
  5. Unauthorized access
  6. Network scanning
  7. Social engineering attacks
  8. Password cracking

Typical Blue Team activities include:

  1. Identifying and responding to security incidents
  2. Analysing system logs and network traffic
  3. Developing security policies and procedures
  4. Implementing security controls
  5. Performing vulnerability assessments
  6. Performing penetration testing
  7. Developing incident response plans
  8. Training users on security best practices

Performance Assessment

An assessment framework for the training would involve evaluating the participants on their understanding of the topics covered, their ability to apply the concepts to real-world scenarios, and their overall performance during the exercises. This can be done through a combination of written tests, practical exercises, and peer reviews.

A detailed breakup of the assessment framework would include:

  • Written Tests: Tests that evaluate the participants’ understanding of the topics covered.
  • Practical Exercises: Exercises that assess the participants’ ability to apply the concepts to real-world scenarios.
  • Peer Reviews: Reviews that evaluate the participants’ overall performance during the exercises.

Trainer Profile:

Sridhar K

Senior Technology Professional with more than two decades of experience in Secure Architecture, Compliance and Standard development

SKILLS
  • Information Security Practitioner – 20 Years +
  • Cloud Architect – 12 Years +
  • Presales and Engineering – 20 Years +
  • Systems Audit and Compliance – 20 Year +
  • Risk Assessment and Management – 20 Years +
  • Project Management – 20 Years +
LANGUAGES

English, Tamil, Hindi, French

CERTIFICATIONS
  • CCSFP – HITRUST
  • CISA – Platinum
  • CISSP
  • CSSLP
  • CRISC
  • AWS Architect
  • Other Tech Certifications from IBM, Oracle, Microsoft, Apple, Checkpoint, Cisco, PMP.