Download as pdf or txt
Download as pdf or txt
You are on page 1of 3

Network Security:

- Principles

12
Jul 2007
13
Jul 2007

T
his course deals comprehensively with significant computer
network security issues. It provides attendees with practical,
hands-on experience of major risks existing in networked
systems as well as in-depth knowledge of how these insecurities can
be mitigated through implementation of specific procedures, tools
and techniques

Attendees Will Learn About


• Learn about significant computer network weaknesses
• Understand the underlying psychology that motivate hackers
• Use the approaches used by hackers to target networks
• Conduct local and wide area network penetration and hacking
• Apply the latest network defense tools and techniques
• Develop robust and comprehensive network security policies

Who Should Attend


This course is suitable for IT professionals and computer network
professionals who need to become knowledgeable about network
insecurities and how to manage them effectively. It will be of special
benefit to those personnel responsible for the implementation and
administration of their organization’s computer network security.
Attendees preparing for security certifications such as the CISSP
(Certified Information Systems Security Professional) and SCNP
(Security Certified Network Professional) will also benefit from the
course.

About the Instructor


Dr Adib Zaray
He graduated with the degrees of MSc and PhD in Computer Science.
He has extensive publications, teaching, research and development
experience involving the design and implementation high-performance
parallel computers.

In 1996 he established Zaray Internet Consultants to provide specialist


consulting and training services. Since 1996, he has been heavily
involved in research and development related to the application of
the Internet and Information Technology, providing consulting and
training services to public and private sector organisations in the United
Kingdom, Republic of Ireland, The Netherlands and Hong Kong. He
specialises in the field of Network, World Wide Web and Information
Technology Security as well as exploitation of Webbased technologies.

His consulting services includes developing network, Web and


information technology security audits, developing security strategies
and conducting Internet marketing for diverse organizations. His
training services include worldwide delivery of specialist courses
developed on strategic issues related to Internet /Intranet,Web and
information technology security.

Adib has delivered many successful hands-on seminars in Hong Kong


since 1999.
hands-on
Hacker Attacks & Defense
& Practice

Date : 12-13 July, 2007 CODE : NSPP INSTRUCTOR : Adib Zaray


DURATION : 2 Days FEE : HK$5,880 EARLY BIRD : HK$5,480

COURSE OUTLINE

1. Network Hacking Basics 4. Local Area Network Hacking: How Does It Happen
• Existing Scope • Virus & Trojan Horse Attacks
- Categories - Infection Sources
- Targets - Control Methods
- Tools
• Blinding Firewalls
• Hacking Approaches - Opaque Transfers
- Essentials - Rule Bending
- Brute Force
• Passive Stealth Attacks
- Stealth
- Sniffer Infiltration
- Social Engineering
- Spyware Invasion
- Invisible Wireless Access
2. Network Targeting By Hackers: How Is It Done
• Foot Printing Organizations 5. Network Hacking Defense:How To Do It Fully
- Organization Details
• Mitigating Denial-of-Service Attacks
- IP Address Range
- Traffic Filtering
- Application Servers
- Bandwidth Defense
- Domain Name System (DNS) Zone File Access
- Load Balancing
• Enumerating Networks & Live Hosts
• Applying Encryption Protocols
- ICMP / TCP / UDP Sweeps
- SSL
- Full-Connect & Stealth Scans
- IPSEC
• Profiling Networked Systems - DNSSEC
- Operating System Fingerprinting
• Deploying Firewalls
- Server Software Identification
- Firewall Organizations
- User / Group Names Identification
• Single Layer
3. Wide Area Network Hacking:How Does It Happen • Multi-Layer
• Spoofing Techniques: • Sub-Netting
- IP address - Auditing Firewall
- DNS Servers - Penetration Testing
- Web Sites • Scanning For Vulnerabilities
• Denial-of-Service Attacks - Discovering NETBIOS & SNMP Access
- Bandwidth Consumption - Checking Router Mis-Configurations
- Router Disruptions - Identifying System Software Bugs
- Server Crashing - Locating Invasive Software
• Network Breaching • Using Intrusion Detection Systems
- TCP/IP Fragmentation - Network & Host Based Detection Techniques
- FTP Bounce - Honeypot Applications - Identifying & Disabling
- Buffer Overflow Exploits Attackers
- Exploiting Network Accessible Shares • Maintaining Log File Integrity
- ICMP Misinformation - Local & Remote Logging
- Instant Messaging - Remote Log Server Setup
- VOIP Filtering
• Developing Network Security Policy
• Network Flooding - Site Access
- UDP Flood - Network Access
- TCP SYN Flood - Firewall Design
- Ping/Smurf Flood - Incident Handling
- Disaster Recovery
Course arrangEments

Course Course Course Duration Fees Enroll before these dates Cancellation
Date Title Code (Days) (HK$) to Enjoy our Early Bird Rates Deadline

July 10-11, 2007 Implementing Wireless Networks and their Security WNS 2 5,880 5,480 Jun 15, 2007 Jun 20, 2007

July 12-13, 2007 Network Security: Hacker Attacks & Defense NSPP 2 5,880 5,480 Jun 15, 2007 Jun 20, 2007

July 16-17, 2007 IT Security for Managers ITSM 2 5,880 5,480 Jun 22, 2007 Jun 27, 2007

Time: 9:00 am - 5:00 pm daily Cancellation and Substitution Policy: The On-Site Option:
Venue: Regal Hong Kong Hotel, Causeway Bay, HK. 1. There is no cancellation charge for cancellations made If there are 10 or more people in your organization
on or before the cancellation Deadline. interested in taking any of these CEL courses, why not
Payment and Confirmation: 2. Registrant(s) who fail to attend, or who cancel(s) after consider the On-Site option? We can readily tailor courses
1. Seminar fees cover full set of course materials, lunches and the cancellation deadline(s) are liable for the entire fee. to your specific needs, send an expert instructor to your
refreshments. Seminar fees are payable in advance. 3. All cancellations should be notified in writing. workplace, and help cut costs. For more information about
2. For enrolment by email, please provide all information per 4. Enrolments received AFTER the cancellation deadline are this service, please contact Miss Mak at CEL at Hong Kong
the standard Enrolment Form on this page. subject to the same cancellation deadline. telephone number 2838 1182.
3. For enrolment by fax, mail or email, CEL will issue an 5. Registrants may send substitutions in their place anytime.
acknowledgement fax or email to the Authorized Person the However, substitutions are not allowed once a seminar has Corporate Discount Scheme & Quantity
next day from receipt of the enrolment. commenced. Discounts:
4. Enrolments received by fax, mail or email on or before early Please visit our Website at www.celhk.com or telephone Ms
bird deadline will be entitled to the early bird rate. Attendance Certificate: Mak at 2838 1182 to inquire the above.
5. Joining instructions for confirmed registrations will be sent to A Certificate of Completion will be given to each delegate
the Authorized Person about 2 weeks before the seminar. who have attended more than 70% of the enrolled Communications Engineering Ltd. reserves the right to
course(s). vary the course programmes or arrangement if this proves
necessary.

ENROLMENT FORM

Name Job Title Tel No Mobile No Course Code

(Mr/Ms)

(Mr/Ms)

(Mr/Ms)

(Mr/Ms)

Company Name:

Address:

Tel: Fax: Email Address:

Contact Person: (Mr/Ms) Job Title: Tel No: Fax No:

Authorized Person: (Mr/Ms) Job Title:

Signature: Date:

Cheque enclosed for HK$ Made payable to Communications Engineering Ltd.


Please note seminar fees are payable in advance Please tick (3) if you require a receipt o

BY PHONE: BY POST TO: BY FAX: BY EMAIL:

( + 2 8
Communications Engineering Ltd.
Call Miss Mak at: Rooms 802-804, Send enrolment form above to
enroll@celhk.com
Hua Qin International Building, our FAX at number:

2838-1182 340 Queen’s Road Central,


Sheung Wan, Hong Kong
2838-7122
PD2007-JUL-2-all © copyright

You might also like