Emerging Security Threats And Countermeasures
About The Course
People are the key information assets of an organization. Unfortunately, they are often not properly trained to detect and identify threats noticing them on time. This becomes easy for an adversary to easily siphon out organization’s intellectual property such as blueprints, business plans, policy details, source codes, patents, copyrights causing irreplaceable competitive advantage and reputation in industry. The only proven and time-tested deterrent to such nefarious activities is a well groomed security mindset that people need to imbibe through regular training in security.
In this two-day workshop, candidates are introduced to real-life incidents which have caused multi-million dollar losses to companies due to lax security controls and implementation. Frequently, they happen due to lack of proper security awareness among the people of the organization. We see how people become the security’s “weakest” link.
Next, we delve deeper into the discovery and reconnaissance techniques which are popularly used by attackers to know about the weak points of entry in the organization’s network. Specific attack techniques such as privilege escalation, password cracking, denial-of-service attacks and so on are put forward to demonstrate how weak security practices and implementation go a long way to compromise the security of the systems where the information assets reside.
Security exploits framework, Threat modeling are now put forward to demonstrate how an attacker is able to penetrate and compromise the security of the organization’s network. Finally, we look into defensive strategies to contain the impact of threat agent to the most prized information asset(s) in the organization. Last but not the least, if in case any breach does take place, the incident management procedures are put forward for proper asset recovery and salvaging.
Who should attend?
This course is focused on all security enthusiasts, team leads, IT managers, decision makers, senior managers to understand the latest threats to information security and the preventive measures for the same.
Table of Contents
Session 1: Introduction & Case Studies
- Introduction & Case Studies
- Business Risks from Security Vulnerabilities
- Security Testing Methodologies
- Types of Attacks
Session 2: Ground Level Realities
- Recent Security Incidents
- Identify the security incidents
- Why Compliance Policies are not enough
- Emerging Malicious Codes & Trends
- People – The Usual Entry Point to Corporate
- Advanced Persistent Threats
- RSA – Anatomy of Attack
Session 3: Knowing the target
- Reconnaissance Principle
- Fingerprinting & Footprinting
- Social Engineering
- Network Mapping
Session 4: Server Side Attack
- Breaking Crypto
- Privilege Escalation
- Password Cracking
- Denial of Service
- Remote Code Execution
- Attacking Web Application
- Proxy Based Attacks
Session 5: Exploitation Framework
- Introduction to Metasploit
- Post Exploitation
- Metasploiting the target
- Owning the Enterprise
Session 6: Threat Modeling
- (in)security – An Overview
- Threat Modeling – Objectives
- Threat Modeling – Meaning and terminology
- Hacker’s Interest Area
- Threat Profiling
- Practical Considerations
Session 7: Defensive Measures – Best Practices
- Security in Design
- Security in Depth
- Security in Defaults
- Concept of Least Privilege
- Minimize Attack Surface
- Preventive & Detective controls
Session 8: Incident Management
- Hacked – Now What?
- Digital Forensics