Program Agenda
Overview and Objectives
This training program is intended to provide a comprehensive introduction into the nature and operation of malicious activity on the Internet. By knowing how criminals perpetrate cybercrimes on the Internet, and what technologies / methodologies they use, participants will be able to more confidently and effectively identify miscreant activity and take pro-active measures to protect their networks
Participation
The program assumes a basic understanding of Internet technologies (although these will be reviewed) and at least an intermediate level of general computer literacy (use of the Windows operating system, ability to install and run applications, manipulate files and folders, basic familiarity of the Unix environment and use of the command line interface )
Structure.
The program encompasses 4 main elements:
- Understanding the Internet and its operation
- Looking at the nature of online badness and understanding cyberime enabling technologies – Botnets, exploit kits and malware
- Observing, identifying and monitoring malicious Internet activity
- Deploying systems to support good practice – NfSen
Workshop Outline
Day 1 |
Introduction and Familiarization |
Day 1 |
The Management and Operational Infrastructure of the Internet |
Day 1 |
Internet Operational Technologies Overview
|
Day 1 |
TCP/IP Review – |
Day 1 |
The Underground Economy –
|
Day 1 Module 5 |
Internet Forensics – |
Day 2 |
Understanding Malware, Botnets and Botnet Operation |
Day 2 Module 7 |
Botnets in Action |
Day 3 Module 8 |
Netflow and Nfsen –a practical application from concept to implementation |
|
Conclusion and review |
Program Agenda
Overview and Objectives
This training program is intended to provide a comprehensive introduction into the nature and operation of malicious activity on the Internet. By knowing how criminals perpetrate cybercrimes on the Internet, and what technologies / methodologies they use, participants will be able to more confidently and effectively identify miscreant activity and take pro-active measures to protect their networks
Participation
The program assumes a basic understanding of Internet technologies (although these will be reviewed) and at least an intermediate level of general computer literacy (use of the Windows operating system, ability to install and run applications, manipulate files and folders, basic familiarity of the Unix environment and use of the command line interface )
Structure.
The program encompasses 4 main elements:
- Understanding the Internet and its operation
- Looking at the nature of online badness and understanding cyberime enabling technologies – Botnets, exploit kits and malware
- Observing, identifying and monitoring malicious Internet activity
- Deploying systems to support good practice – NfSen
Workshop Outline
Day 1 |
Introduction and Familiarization |
Day 1 |
The Management and Operational Infrastructure of the Internet |
Day 1 |
Internet Operational Technologies Overview
|
Day 1 |
TCP/IP Review – |
Day 1 |
The Underground Economy –
|
Day 1 Module 5 |
Internet Forensics – |
Day 2 |
Understanding Malware, Botnets and Botnet Operation |
Day 2 Module 7 |
Botnets in Action |
Day 3 Module 8 |
Netflow and Nfsen –a practical application from concept to implementation |
|
Conclusion and review |