• Professional Development
  • Medicine & Nursing
  • Arts & Crafts
  • Health & Wellbeing
  • Personal Development

34 Educators providing Security courses in Rothwell

Cabe

cabe

Northampton

The role of CABE’s Presidential Team and Board is to set out the strategic objectives and aims of the Association and to ensure their delivery. All representatives on the board are members of CABE are nominated to the position by Chartered Members. They represent a mixture of views from different specialities and areas across the industry making sure there is a variety of perspectives to help shape CABE’s unifying voice. CABE Patron Lord John Lytton BSc FCABE (Hon) IRRV FRICS In his role as patron of CABE, Lord Lytton acts as an influential figurehead, creating valuable partnerships with organisations across the globe through his extensive network of industry and Governmental contacts and assisting the Association in raising its profile and influence within the building and construction industry. Lord Lytton is a leading chartered surveyor and an active contributor to the House of Lords. He is chairman of the boundaries and party walls professional panel of the Royal Institution of Chartered Surveyors and a Vice Chairman of the All Party Parliamentary Group for Excellence in the Built Environment as well as being newly appointed to the House of Lords Information Committee. He has been an Honorary Fellow of ABE since 1997, and CABE since its formation in 2014. Presidential Team Joseph Birt PCABE FCABE – President Joseph Birt worked for 22 years within Local Authority Building Control in various posts; the latter 12 years as Specialist Support Officer for a Cluster of Councils, which included responsibility for advising on fire safety aspects of the Building Regulations. He was, for ten years, a Director of the William Keown Charitable Trust, which champions equality in the built environment and celebrates the achievements of people with disabilities. He has been elected twice as Chairman of the Northern Ireland Fire Safety Panel. By Ministerial Appointment he served two terms on the Northern Ireland’s Building Regulations Advisory Committee (BRAC) where he contributed to the development of the current Northern Ireland Building Regulations. He has also served two terms on the Department of Communities, Historic Buildings Council. Joseph is a Chartered Building Engineer, who continues to be active within his local CABE Region; currently Treasurer and past Chairman of the CABE Northern Ireland Region’. He is now the Technical Director of FRSNI Ltd. Richard Smith VPCABE FCABE – Vice-President Richard Smith commenced his employment as a YTS Trainee in Building Control back in 1989 and has progressed his career to become the Head of Standards and Innovation and Research at NHBC where he oversees the delivery and implementation of NHBC's Technical Standards, Technical policy, Acceptance of innovative and non-traditional construction methods and leads the NHBC Foundation. Richard is also a member of The Building Regulations Advisory Committee and support a number of Sub Committees including new building broadband connectivity, Part M Working Group and Building Act 1984 working group. Richard Flynn CEng CEnv CWEM VPCABE FCABE – Vice-President Richard is an independent private practitioner trading as Flynn & Shaw, Chartered Building Engineers. As well as being a Chartered Building Engineer, he is a Chartered Engineer, Chartered Environmentalist, Chartered Water and Environment Manager, Registered Building Surveyor and Certified Site Assessor. Richard is a recognised expert in the area of onsite wastewater treatment and provides a complete site suitability assessment, treatment system design, and certification of installation for onsite wastewater treatment systems throughout Ireland. Richard has been Chair of the CABE Membership and Professional Standards Committee (MPSC) since its inception in 2019 as well as member of the Southern Ireland Region committee of CABE. Stewart C McArthur BSc (Hons) PPCABE FCABE RICS Dip BC – Past President Stewart has 30 years’ experience in the house building industry. He has a degree in Fire Risk Engineering from Glasgow Caledonian University. During his studies he also attended seminars at Maryland University and had the privilege of being tutored by some of the most widely respected experts in the fire engineering sector. Stewart began his career in building standards before moving into the warranty sector. He also has recent experience as a site manager. This broad experience has given him a greater understanding of the house building industry from all perspectives. He has been a member of CABE since 2001 and has played an active part in the regional committee for the past ten years. CABE Board Daniel Fordham FCABERussell Urwin FCABETony Harvey-Soanes FCABEPaul Grinyer FCABEDavid Courtney CEnv FCABE Lindsay Richards BSc MBA MCABE Chartered Building EngineerZoe Cox FCABEMishka Scott MCABE Chartered Building EngineerDavid Kitcatt FCABEIsacc Sunder Packianathan FCABE Executive Team Dr Gavin Dunn BSc (Hons) MSc PhD FCABE – Chief Executive Originally trained as an architect, Gavin initially practised in North America with a large construction engineering firm before returning to the UK to specialise in the energy and environmental performance of buildings in 1998. Gavin advanced this specialism through positions at the Welsh School of Architecture, and Elmhurst Energy, where he helped develop some of Europe’s leading building energy certification and labelling systems. In 2013 Gavin was appointed Director of Building Performance at the Building Research Establishment (BRE) where he was responsible for a portfolio of BRE's globally leading services including BREEAM and CEEQUAL the world’s foremost environmental assessment methods for the built environment. In 2018, Gavin was appointed as Chief Executive of CABE where he works to help enable a more professional construction sector that works to create better, safer and more sustainable buildings that enhance people’s lives. Gavin was a member of the Building Regulations Advisory Committee (BRAC) of the UK Government from 2015 to 2022 where he served as Chairman of the Future Homes Standard Working Group. Jackie Macaulay – Chief Operating Officer Jackie is responsible for all aspects of the organisations operations and internal processing. Her remit includes compliance, legal services, HR, OD & change management, IT, facilities, PR & communications, membership processing and deputising for the CEO in his absence. Her experience spans a range of manufacturing, construction and not-for-profit organisations with her first Director position as HR Director for Electrolux in 2004. Jackie has worked across the UK, Ireland and internationally across Europe and Asia managing diverse and multi-disciplined teams. She brings to CABE the senior expertise that will develop the organisation as it moves forward with its modernisation and development strategy. Richard Harral BA BArch FCABE RIBA – Technical Director Richard Harral is the Technical Director for CABE. He has previously worked as an architect in both public and private sector practice, and as a policy official in the Building Regulations Division of MHCLG between 2007 and 2014 where he oversaw introduction of policies on accessible housing, security standards, broadband and the national space standard for new homes. He was subsequently Head of Technical Policy in the period 2014-2017. He currently sits on the CIC Competence Steering Group, and chairs a number of competence working groups including on Designer and Architect Competence. He was Technical author for Flex 8670, the recently published British Standard on Competence for building safety in Built environment industries. Alison Duckles CBE – Professional Development Director Alison has worked in the Construction sector for over 24 years, predominantly with Laing O’Rourke. She previously held roles with the Chartered Institution of Waste Management and Eastern Group plc in the power sector. Predominantly focused on learning and development while driving competence, professional standards, and futures skills requirement; Alison worked extensively on the creation of new construction apprenticeships, engaging employers, providers, sector bodies and Government. In her role with CABE Alison is responsible for continuing to strengthen partnerships with academic institutions, provide members with quality training and CPD opportunities and Support the Association’s ambition to drive competency and professional responsibility in the construction sector. CABE Staff Membership Services Team – membership@cbuilde.com Our friendly, experienced membership team is always on hand to offer the best possible advice on becoming a member of CABE, advising you on the best route to membership and helping you to progress through our grades as your career develops. Amy Chatfield – Membership Services Manager Amy leads the Membership Team, which is responsible for all membership processing, professional interviews for CABE Chartered Membership and registrations for both the Engineering Council and Society for the Environment. With a strong background in customer service, Amy joined CABE in 2015. She has held a variety of positions, including roles in the Publications Team – working on the building engineer journal – and the Events & Marketing Team. After building extensive knowledge of the membership journey, she moved into the Membership Team in 2018; since then, she has worked continuously to improve processes, ensuring that the Association provides excellent customer service to all new and existing members. Alongside her role as Membership Services Manager, Amy is a trained Mental Health First Aider (MHFA), providing wellbeing support for her colleagues. Sabrina Miah Professional Review Co-ordinator Tara Talley Membership Services Co-ordinatorJoshua Law Membership Services Administrator Communications Team – info@cbuilde.com The Communications team deliver vital resources, news, and information to our membership, keeping them up-to-date with industry changes, standards, and opinions. This is done through direct contact with our membership, delivering our monthly journal, BuildingEngineer . Laura Richardson - Head of Communications Laura has been with CABE since 2018 when she joined as PR and Communication manager. She is responsible for implementing the communications strategy across the Association’s communication streams including PR, Marketing, and Digital Infrastructure functions. She joined CABE from Booker, where she gained experience in website marketing and design. Along with her previous experience working in publications and marketing roles in the construction industry she brings a lot of skills and strengths to the team. Maya Bullock Communications & Digital Designer Abigail Crook Communications Administrator Professional Development Team – training@cbuilde.com CABE provides a range of services to our members and the wider industry to assist in the expansion of knowledge in respect of the built environment. Our Professional Development Team facilitate this by ensuring opportunities such as our suite of regional conferences, annual conference & exhibition, training courses, local/regional CPD and our 12 UK & ROI regions run smoothly and offer the highest possible quality in their delivery. Kirri Porter-White - Competency & Learning Lead Kirri has been with the association since 2015, working initially within the Regional Services and Events team to provide support for the regional committees over CABE’s 12 regions in the UK and Ireland, as well as our international Chapters. Kirri is responsible for the development and deployment of CABE’s training and learning infrastructure, focusing on both technical competency and wellbeing within the construction industry. Kirri’s team also work with the Professional Development Director on academic accreditation and relationships with universities. Rosemary Brewill Regional Services Co-ordinatorShaneka Foster Professional Development Administrator Operations Team – info@cbuilde.com The Operations Team are involved in the day-to-day activities of the Association, to ensure the smooth running of all CABE’s activities, including Finance, IT, Legal and Facilities. Carl Pearson - Head of Legal and Governance Services Carl has worked both private practice and in-house roles, within the sectors of welfare law, housing law, debt law, consumer law, compliance law, and commercial law. Joining CABE in 2018 from Dixons Carphone, Carl is responsible for providing the Association with internal legal advice on its business practices, activities and contractual relationships, development and review of various internal policies and procedures and day-to-day management of disciplinary and complaints investigations. Jacky Lonsdale - Head of Finance Jacky joined CABE in November 2021 and brings a wealth of experience having worked for a number of both large corporate companies and smaller businesses including JVC, Total Oil Marine, Bosch Security Systems and Vinci Construction. Before joining CABE she worked for the Auto-Cycle Union, a motorcycle membership organisation. As Head of Finance Jacky is responsible for the delivery of financial information to the management team. Finance encompasses all areas of accounting processes, monthly management accounts, forecasts, annual budgets and financial statements. It also covers all aspects of audit liaison and statutory return requirements. Jacky’s mission is to ensure financial reporting is accurate, concise and on time. Helena Wootton Reception and Office ManagerAlison Lodge Executive AssistantCharlotte Taylor Finance Assistant Hong Kong Office – info@cbuilde.com Vivian Sie BA (Hons) MA MSc - General Manager Vivian is the General Manager of CABE Hong Kong Chapter responsible for daily operation, enhancing communication with members and working partners, upholding the reputation of one of the international recognised associations in Hong Kong and beyond.Before joining CABE, Vivian had experience in the areas of corporate governance and public sector management where she was instrumental in providing efficient secretarial support to a local leading professional institute and a regulatory body. Her remit included membership processing and benefits, media relations, disciplinary proceedings, set-up of Biennale Foundation and Beijing Representative Office, key event planning and execution. After graduating with BA honours in translation, Vivian obtained a distinction in the Master of Arts in International Communication from the Macquarie University, Australia. She has a Master of Science in Public Sector Management. Mable Hung Administrator

Courses matching "Security"

Show all 351

Security+

5.0(3)

By Systems & Network Training

Security+ training course description A hands on course aimed at getting delegates successfully through the CompTia Security+ examination. What will you learn Explain general security concepts. Describe the security concepts in communications. Describe how to secure an infrastructure. Recognise the role of cryptography. Describe operational/organisational security. Security+ training course details Who will benefit: Those wishing to pass the Security+ exam. Prerequisites: TCP/IP foundation for engineers Duration 5 days Security+ training course contents General security concepts Non-essential services and protocols. Access control: MAC, DAC, RBAC. Security attacks: DOS, DDOS, back doors, spoofing, man in the middle, replay, hijacking, weak keys, social engineering, mathematical, password guessing, brute force, dictionary, software exploitation. Authentication: Kerberos, CHAP, certificates, usernames/ passwords, tokens, biometrics. Malicious code: Viruses, trojan horses, logic bombs, worms. Auditing, logging, scanning. Communication security Remote access: 802.1x, VPNs, L2TP, PPTP, IPsec, RADIUS, TACACS, SSH. Email: S/MIME, PGP, spam, hoaxes. Internet: SSL, TLS, HTTPS, IM, packet sniffing, privacy, Javascript, ActiveX, buffer overflows, cookies, signed applets, CGI, SMTP relay. LDAP. sftp, anon ftp, file sharing, sniffing, 8.3 names. Wireless: WTLS, 802.11, 802.11x, WEP/WAP. Infrastructure security Firewalls, routers, switches, wireless, modems, RAS, PBX, VPN, IDS, networking monitoring, workstations, servers, mobile devices. Media security: Coax, UTP, STP, fibre. Removable media. Topologies: Security zones, DMZ, Intranet, Extranet, VLANs, NAT, Tunnelling. IDS: Active/ passive, network/host based, honey pots, incident response. Security baselines: Hardening OS/NOS, networks and applications. Cryptography basics Integrity, confidentiality, access control, authentication, non-repudiation. Standards and protocols. Hashing, symmetric, asymmetric. PKI: Certificates, policies, practice statements, revocation, trust models. Key management and certificate lifecycles. Storage: h/w, s/w, private key protection. Escrow, expiration, revocation, suspension, recovery, destruction, key usage. Operational/Organisation security Physical security: Access control, social engineering, environment. Disaster recovery: Backups, secure disaster recovery plans. Business continuity: Utilities, high availability, backups. Security policies: AU, due care, privacy, separation of duties, need to know, password management, SLAs, disposal, destruction, HR policies. Incident response policy. Privilege management: Users, groups, roles, single sign on, centralised/decentralised. Auditing. Forensics: Chain of custody, preserving and collecting evidence. Identifying risks: Assets, risks, threats, vulnerabilities. Role of education/training. Security documentation.

Security+
Delivered in Internationally or OnlineFlexible Dates
£2,797

Certified Wireless Security Professional

5.0(3)

By Systems & Network Training

CWSP training course description A hands-on training course concentrating solely on WiFi security with an emphasis on the delegates learning the necessary knowledge and skills to pass the CWSP exam. The course progresses from simple authentication, encryption and key management onto in depth coverage of 802.X and EAP along with many other security solutions such as access control, intrusion prevention and secure roaming. What will you learn Demonstrate the threats to WiFi networks. Secure WiFi networks. Configure: WPA2 RADIUS 802.1x EAP Pass the CWSP exam. CWSP training course details Who will benefit: Technical network staff. Technical security staff. Prerequisites: Certified Wireless Network Associate. Duration 5 days CWSP training course contents WLAN Security overview Standards, security basics, AAA, 802.11 security history. Hands on WLAN connectivity. Legacy 802.11 security Authentication: Open system, shared key. WEP. VPNs. MAC filters. SSID segmentation, SSID cloaking. Hands on Analysing 802.11 frame exchanges, viewing hidden SSIDs. Encryption Basics, AES, TKIP, CCMP, WPA, WPA2. Hands on Decrypting 802.11 data frames. 802.11 layer 2 authentication 802.1X: Supplicant, Authenticator, Authentication server. Credentials. Legacy authentication. EAP, Weak EAP protocols, Strong EAP protocols: EAP -PEAP, EAP-TTLS, EAP-TLS, EAP-FAST. Hands on Analysing 802.1X/EAP frames. 802.11 layer 2 dynamic key generation Robust Security Network. Hands on Authentication and key management. SOHO 802.11 security WPA/WPA2 personal, Preshared Keys, WiFi Protected Setup (WPS). Hands on PSK mapping. WLAN security infrastructure DS, Autonomous APs, WLAN controllers, split MAC, mesh, bridging, location based access control. Resilience. Wireless network management system. RADIUS/LDAP servers, PKI, RBAC. Hands on 802.1X/EAP configuration. RADIUS configuration. 802.11 Fast secure roaming History, RSNA, OKC, Fast BSS transition, 802.11k. Hands on Roaming. Wireless security risks Rogue devices, rogue prevention. Eavesdropping, DOS attacks. Public access and hotspots. Hands on Backtrack. WiFi security auditing Layer 1 audit, layer 2 audit, pen testing. WLAN security auditing tools. WiFi security monitoring Wireless Intrusion Detection and Prevention Systems. Device classification, WIDS/WIPS analysis. Monitoring. 802.11w. Hands on Laptop spectrum analysers. VPNs, remote access, guest access Role of VPNs in 802.11, remote access, hotspots, captive portal. Wireless security policies General policy, functional policy, recommendations.

Certified Wireless Security Professional
Delivered in Internationally or OnlineFlexible Dates
£3,697

Advanced Junos Security

5.0(3)

By Systems & Network Training

Advanced Junos Security training course description This course provides students with intermediate routing knowledge and configuration examples. The course includes an overview of protocol-independent routing features, load balancing and filter-based forwarding, OSPF, BGP, IP tunneling, and high availability (HA) features. Junos Intermediate Routing (JIR) is an intermediate-level course. What will you learn Demonstrate the understanding of integrated user firewall. Implement next generation Layer 2 security features. Implement virtual routing instances in a security setting. Utilize Junos tools for troubleshooting Junos security implementations. Implement IPS policy. Advanced Junos Security training course details Who will benefit: Individuals responsible for implementing, monitoring, and troubleshooting Junos security components. Prerequisites: Intro to the Junos Operating System Duration 5 days Advanced Junos Security training course contents Junos Layer 2 Packet Handling and Security Features Transparent Mode Security Secure Wire Layer 2 Next Generation Ethernet Switching MACsec Lab 2 Implementing Layer 2 Security Virtualization Virtualization Overview Routing Instances Logical Systems Lab 3 Implementing Junos Virtual Routing AppSecure Theory AppSecure Overview AppID Overview AppID Techniques Application System Cache Custom Application Signatures AppSecure Implementation AppTrack AppFW AppQoS APBR SSL Proxy Lab 4 Implementing AppSecure Working with Log Director Log Director Overview Log Director Components Installing and setting up Log Director Clustering with the Log Concentrator VM Administrating Log Director Lab 5 Deploying Log Director Sky ATP Theory Sky ATP Overview Monitoring Sky ATP Analysis and Detection of Malware Sky ATP Implementation Configuring Sky ATP Installing Sky ATP Analysis and detection of Malware Infected Host Case Study Lab 6 Instructor Led Sky ATP Demo Implementing UTM UTM Overview AntiSpam AntiVirus Content and Web Filtering Lab 7 Implementing UTM Introduction to IPS IPS Overview Network Asset Protection Intrusion Attack Methods Intrusion Prevention Systems IPS Inspection Walkthrough IPS Policy and Configuration SRX IPS Requirements IPS Operation Modes Basic IPS Policy Review IPS Rulebase Operations Lab 8 Implementing Basic IPS Policy SDSN SDSN Overview, Components & Configuration Policy Enforcer Troubleshooting SDSN Use Cases Lab 9 Implementing SDSN Enforcement, Monitoring, and Reporting User Role Firewall and Integrated User Firewall Overview User Role Firewall Implementation Monitoring User Role Firewall Integrated User Firewall Implementation Monitoring Integrated User Firewall Lab 10 Configure User Role Firewall and Integrated User Firewall Troubleshooting Junos Security Troubleshooting Methodology Troubleshooting Tools Identifying IPsec Issues Lab 11 Performing Security Troubleshooting Techniques Appendix A: SRX Series Hardware and Interfaces Branch SRX Platform Overview High End SRX Platform Overview SRX Traffic Flow and Distribution SRX Interfaces

Advanced Junos Security
Delivered in Internationally or OnlineFlexible Dates
£4,997

Cyber security for engineers

5.0(3)

By Systems & Network Training

Cyber security training course description This cyber security course focusses on the network side of security. Technologies rather than specific products are studied focussing around the protection of networks using firewalls and VPNs. What will you learn Describe: - Basic security attacks - RADIUS - SSL - VPNs Deploy firewalls and secure networks Explain how the various technologies involved in an IP VPN work. Describe and implement: - L2TP - IPsec - SSL - MPLS, L3, VPNs. Cyber security training course details Who will benefit: Anyone working in the security field. Prerequisites: TCP/IP foundation for engineers Duration 5 days Cyber security training course contents Security review Denial of service, DDOS, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits IP spoofing, SYN attacks, hijacking, reflectors and amplification, keeping up to date with new threats. Hands on port scanning, use a 'hacking' tool. Client and Server security Windows, Linux, Log files, syslogd, accounts, data security. Hands on Server hardening. Firewall introduction What is a firewall? Firewall benefits, concepts. HAnds on launching various attacks on a target. Firewall types Packet filtering, SPI, Proxy, Personal. Software firewalls, hardware firewalls. Firewall products. Hands on Simple personal firewall configuration. Packet filtering firewalls Things to filter in the IP header, stateless vs. stateful filtering. ACLs. Advantages of packet filtering. Hands on Configuring packet filtering firewalls. Stateful packet filtering Stateful algorithms, packet-by-packet inspection, application content filtering, tracks, special handling (fragments, IP options), sessions with TCP and UDP. Firewall hacking detection: SYN attacks, SSL, SSH interception. Hands on SPI firewalls. Proxy firewalls Circuit level, application level, SOCKS. Proxy firewall plusses and minuses. Hands on Proxy firewalls. Firewall architectures Small office, enterprise, service provider, what is a DMZ? DMZ architectures, bastion hosts, multi DMZ. Virtual firewalls, transparent firewalls. Dual firewall design, high availability, load balancing, VRRP. Hands on Resilient firewall architecture. Testing firewalls Configuration checklist, testing procedure, monitoring firewalls, logging, syslog. Hands on Testing firewalls. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Password cracking. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, RADIUS. Hands on Using certificates. VPN overview What is a VPN? What is an IP VPN? VPNs vs. Private Data Networks, Internet VPNs, Intranet VPNs, Remote access VPNs, Site to site VPNs, VPN benefits and disadvantages. VPN Tunnelling VPN components, VPN tunnels, tunnel sources, tunnel end points, tunnelling topologies, tunnelling protocols, which tunnelling protocol? Requirements of tunnels. L2TP Overview, components, how it works, security, packet authentication, L2TP/IPsec, L2TP/PPP, L2 vs L3 tunnelling. Hands on Implementing a L2TP tunnel. IPsec AH, HMAC, ESP, transport and tunnel modes, Security Association, encryption and authentication algorithms, manual vs automated key exchange, NAT and other issues. Hands on Implementing an IPsec VPN. SSL VPNs Layer 4 VPNs, advantages, disadvantages. SSL. TLS. TLS negotiation, TLS authentication. TLS and certificates. Hands on Implementing a SSL VPN. MPLS VPNs Introduction to MPLS, why use MPLS, Headers, architecture, label switching, LDP, MPLS VPNs, L2 versus L3 VPNs. Point to point versus multipoint MPLS VPNs. MBGP and VRFs and their use in MPLS VPNs. Hands on Implementing a MPLS L3 VPN. Penetration testing Hacking webservers, web applications, Wireless networks and mobile platforms. Concepts, threats, methodology. Hands on Hacking tools and countermeasures.

Cyber security for engineers
Delivered in Internationally or OnlineFlexible Dates
£3,697

SIP security for engineers

5.0(3)

By Systems & Network Training

SIP security training course description A hands-on course covering SIP security. It is assumed that delegates already know SIP as this course focuses purely on the security issues in SIP IP telephony networks. Hands-on practicals follow each major theory session and include use of various SIP security tools such as vomit, sipp, sipsak and sivus amongst others. What will you learn Secure SIP networks Use various SIP security tools SIP security training course details Who will benefit: Technical staff working with SIP. Technical security staff. Prerequisites: SIP for engineers Duration 2 days SIP security training course contents SIP review SIP infrastructure and entities, example SIP session. Hands on Simple SIP network with and without authentication. SIP security attacks DOS attacks, infrastructure attacks, eavesdropping, spoofing, replay, message integrity. Hands on Basic SIP packet capture, infrastructure attacks. SIP tools SIP packet creation: Sivus, SIPsak, PROTOS, SFTF, SIP bomber, SIPp, Seagull, Nastysip. SIP packet generators: SIPNess, NetDude. Monitoring: Wireshark, Cain & Abel, Vomit, Oreka, VoiPong. Scripts and tools: SIP-Fun, Skora.net, kphone-ddos, sip-scan, sip-kill, sip-redirectrtp. Health of different tools. Hands on Generating SIP packets, rebuilding conversations from captured packets, password cracking. VPNs and SIP IPSec, AH, ESP, transport mode, tunnel mode, Pre Shared Keys, Public keys. Hands on SIP calls over IPSec. Secure SIP signaling SIP relationship with HTTP, Deprecated HTTP 1.0 basic authentication, HTTP 1.1 Digest authentication, S/MIME, SIPS, SIPS URI, TLS, DTLS, PKI infrastructures. Hands on SIP with TLS. Secure media streams SRTP, features, packet format, default encryption, default authentication, key distribution. S/MIME, MIKEY, SDP security descriptions. SIP security agreements. Hands on Analysing SRTP packets. Firewalls NAT traversal. Impact of firewall on infrastructure attacks. TLS and firewalls. SIP specific firewalls. Hands on SIP calls through a firewall.

SIP security for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,727

Cyber Security demystified

5.0(3)

By Systems & Network Training

Cyber Security training course description The reliance of the world on the Internet and computer systems means the protection of information systems is vitally important. This is even more important smart devices and the Internet of Things increase the number of devices. This Cyber Security provides a concise overview on the threats and attacks that can happen along with the counter measures that can be taken. What will you learn Recognise the different types of attack. Describe the attacks that can be made against information systems. Describe the counter measures available. Cyber Security training course details Who will benefit: Non-technical staff working with computers. Prerequisites: None. Duration 1 day Cyber Security training course contents What is Cyber Security? Computer security, Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Attacks Physical access, Social engineering, Privilege escalation, Malware, Trojans, worms, viruses, rootkits, Backdoors, Denial of Service (DOS), Distributed DOS, Eavesdropping, Spoofing, Man the middle tampering. Countermeasures Prevention, detection, response. Physical, user accounts, Firewalls, IDS, AAA, authentication, cryptography, encryption, data integrity. Cyber security standards ETSI, ISO 27001, 27002, NIST, ISA/IEC 62443.

Cyber Security demystified
Delivered in Internationally or OnlineFlexible Dates
£967

IP security foundation for engineers

5.0(3)

By Systems & Network Training

IP security training course description Connection to the Internet is becoming an essential business tool. This course looks at firewalls, digital certificates, encryption and other essential topics for e-commerce sites. A generic course that looks at firewalls and VPNs. Hands on sessions include using hacking tools and configuring firewalls. What will you learn Describe: Basic security attacks RADIUS SSL IPSec VPNs Implement digital certificates Deploy firewalls to protect Web servers and users. Secure Web servers and clients. IP security training course details Who will benefit: Network administrators. Network operators. Security auditors Prerequisites: TCP/IP foundation for engineers Duration 2 days IP security training course contents TCP/IP review Brief overview of the relevant headers. Hands on Download software for course, use analyser to capture passwords on the wire. Security review Policies, Types of security breach, denial of service, data manipulation, data theft, data destruction, security checklists, incident response. Security exploits The Internet worm, IP spoofing, SYN attack, hijacking, Ping o' Death… keeping up to date with new threats. Hands on Use a port scanning tool, use a 'hacking' tool. Firewalls Products, Packet filtering, DMZ, content filtering, stateful packet inspection, Proxies, firewall architectures, Intrusion Detection Systems, Viruses. Hands on Set up a firewall and prevent attacks. NAT NAT and PAT, Why use NAT, NAT-ALG, RSIP. Encryption Encryption keys, Encryption strengths, Secret key vs Public key, algorithms, systems, SSL, SSH, Public Key Infrastructures. Hands on Run a password-cracking program. Authentication Types of authentication, Securid, Biometrics, PGP, Digital certificates, X.509 v3, Certificate authorities, CRLs, PPP authentication, RADIUS. Hands on Using certificates. Web client and server security Cookies, browser certificates, censorship, PICS. Operating system security, Web server user authentication, Restricting access, Logging, Securing CGI scripts. Hands on Browser security. VPNs and IPSec What is a VPN, tunnelling, L2F, PPTP, L2TP, IPSec, AH, ESP, transport mode, tunnel mode.

IP security foundation for engineers
Delivered in Internationally or OnlineFlexible Dates
£1,497

Principles and Practices of Cyber Security

5.0(10)

By GBA Corporate

Overview Cyber Security plays an important role in every business as it encompasses everything that relates to protecting sensitive data, personal information, intellectual property, data, and governmental and industry information systems from theft and damage attempted by criminals and adversaries. This course is designed to understand and gain practical skills to plan, deliver and monitor IT/cyber security to internal and external clients understanding a complete, knowledge in the areas of IT policies, Security-Operational-Run-Book, security/penetration testing, ethical hacking and black hat hacking including understanding the basics of Kali Operating System and its tools and techniques. It will also cover WiFi security, Website security, human factors, cyber forensics, and cyber security team management, including all other areas in relation to Cyber Security.

Principles and Practices of Cyber Security
Delivered in Internationally or OnlineFlexible Dates
£1,718 to £3,626

The Ultimate Guide to Event Planning - 1 Day Workshop in Corby

By Mangates

Event Planning 1 Day Training in Corby

The Ultimate Guide to Event Planning - 1 Day Workshop in Corby
Delivered In-Person + more
£595 to £795

Securing Linux systems

5.0(3)

By Systems & Network Training

Securing Linux systems training course description This course teaches you everything you need to know to build a safe Linux environment. The first section handles cryptography and authentication with certificates, openssl, mod_ssl, DNSSEC and filesystem encryption. Then Host security and hardening is covered with intrusion detection, and also user management and authentication. Filesystem Access control is then covered. Finally network security is covered with network hardening, packet filtering and VPNs. What will you learn Secure Linux accounts. Secure Linux file systems. Secure Linux access through the network. Securing Linux systems training course details Who will benefit: Linux technical staff needing to secure their systems. Prerequisites: Linux system administration (LPIC-1) Duration 5 days Securing Linux systems training course contents Cryptography Certificates and Public Key Infrastructures X.509 certificates, lifecycle, fields and certificate extensions. Trust chains and PKI. openssl. Public and private keys. Certification authority. Manage server and client certificates. Revoke certificates and CAs. Encryption, signing and authentication SSL, TLS, protocol versions. Transport layer security threats, e.g. MITM. Apache HTTPD with mod_ssl for HTTPS service, including SNI and HSTS. HTTPD with mod_ssl to authenticate users using certificates. HTTPD with mod_ssl to provide OCSP stapling. Use OpenSSL for SSL/TLS client and server tests. Encrypted File Systems Block device and file system encryption. dm-crypt with LUKS to encrypt block devices. eCryptfs to encrypt file systems, including home directories and, PAM integration, plain dm-crypt and EncFS. DNS and cryptography DNSSEC and DANE. BIND as an authoritative name server serving DNSSEC secured zones. BIND as an recursive name server that performs DNSSEC validation, KSK, ZSK, Key Tag, Key generation, key storage, key management and key rollover, Maintenance and resigning of zones, Use DANE. TSIG. Host Security Host Hardening BIOS and boot loader (GRUB 2) security. Disable useless software and services, sysctl for security related kernel configuration, particularly ASLR, Exec-Shield and IP / ICMP configuration, Exec-Shield and IP / ICMP configuration, Limit resource usage. Work with chroot environments, Security advantages of virtualization. Host Intrusion Detection The Linux Audit system, chkrootkit, rkhunter, including updates, Linux Malware Detect, Automate host scans using cron, AIDE, including rule management, OpenSCAP. User Management and Authentication NSS and PAM, Enforce password policies. Lock accounts automatically after failed login attempts, SSSD, Configure NSS and PAM for use with SSSD, SSSD authentication against Active Directory, IPA, LDAP, Kerberos and local domains, Kerberos and local domains, Kerberos tickets. FreeIPA Installation and Samba Integration FreeIPA, architecture and components. Install and manage a FreeIPA server and domain, Active Directory replication and Kerberos cross-realm trusts, sudo, autofs, SSH and SELinux integration in FreeIPA. Access Control Discretionary Access Control File ownership and permissions, SUID, SGID. Access control lists, extended attributes and attribute classes. Mandatory Access Control TE, RBAC, MAC, DAC. SELinux, AppArmor and Smack. etwork File Systems NFSv4 security issues and improvements, NFSv4 server and clients, NFSv4 authentication mechanisms (LIPKEY, SPKM, Kerberos), NFSv4 pseudo file system, NFSv4 ACLs. CIFS clients, CIFS Unix Extensions, CIFS security modes (NTLM, Kerberos), mapping and handling of CIFS ACLs and SIDs in a Linux system. Network Security Network Hardening FreeRADIUS, nmap, scan methods. Wireshark, filters and statistics. Rogue router advertisements and DHCP messages. Network Intrusion Detection ntop, Cacti, bandwidth usage monitoring, Snort, rule management, OpenVAS, NASL. Packet Filtering Firewall architectures, DMZ, netfilter, iptables and ip6tables, standard modules, tests and targets. IPv4 and IPv6 packet filtering. Connection tracking, NAT. IP sets and netfilter rules, nftables and nft. ebtables. conntrackd Virtual Private Networks OpenVPN server and clients for both bridged and routed VPN networks. IPsec server and clients for routed VPN networks using IPsec-Tools / racoon. L2TP.

Securing Linux systems
Delivered in Internationally or OnlineFlexible Dates
£3,697