TRACK | COURSE FOR | DURATION |
Incident Response | Network system administrator | 3 Days (8 Hours per day) |
Objective of the course is learning knowledge for detecting malware intrusion and tracking down malware in infected system. This course requires prerequisite knowledge of working principle of transport layer (layer 4) protocols of TCP/IP model and a laptop for training individually.
Detect and track down malwares in infected system Find traces of malware
from their activity with operating system artifacts Analyze file system
metadata and correlation between process and thread Find traces of rootkits
in physical memory Analyze registry.
Practical training in virtual environment using vSphere or VirtualBox Various and useful practical training with our high-quality training scenarios.
Learn the methodologies, tools, and manual analysis techniques used real-life situations.
Gain the in demand career skills of a CERT.
Receive a completion certificate.
Analysis of file system Investigation of "Creation time" field in $FILE_NAME Analysis of ADS(Alternate Data Stream) Investigation and recovery of deleted execution file Process analysis Windows major processes Detection of suspicious process Analysis of process using network resources Physical memory analysis Understanding of kernel/user-mode ootkits Detection of DLL injection / code injection Detection of hooking Detection of DKOM Signature-based detection
TRACK | COURSE FOR | DURATION |
Penetration testing |
Everyone | 3 Days (8 Hours per day) |
Objective of the course is technical understanding of security threats caused by major TCP/IP protocol vulnerability. This course requires prerequisite knowledge of basic concept of OSI 7 layer and TCP/IP protocol stack, experience using CLI commands in Windows and Linux, and a laptop for training individually.
High-quality practical training in virtual environment using vSphere or VirtualBox. About 70% of the training consists of practical training with real-life scenarios. Learn the methodologies, tools, and manual network attack techniques used real-life situations. Learn threats likely to be caused by someone exploiting network protocol vulnerabilities. Gain the in demand career skills of a penetration tester. Receive a completion certificate.
ARP(Address Resolution Protocol) vulnerability Working principle of ARP Overview of ARP vulnerability overview Network packet sniffing using ARP spoofing Network packet modification using ARP spoofing DNS(Domain Name System) vulnerability Working principle of DNS DNS vulnerability overview Pharming using DNS spoofing DNS cache poisoning DHCP(Dynamic Host Configuration Procotol) vulnerability Working principle of DHCP DHCP vulnerability overview DHCP spoofing attack SSH(Secure SHell) vulnerability Basics of cryptology Working principle of SSH SSH vulnerability overview SSH version rollback attack SSL(Secure Socket Layer) / TLS(Transport Layer Security) vulnerability Basics of cryptology Working principle of SSL/TLS SSL/TLS vulnerability overview Stealing SSL certificate using SSL MITM SSL Strip attack Analysis of previously known vulnerability (Freak, Poodle, Logjam, Heart Bleed) SNMP(Simple Network Management Protocol) vulnerability Working principle of SNMP SNMP vulnerability overview Attacking router using SNMP vulnerability Attacking switch using SNMP vulnerability VLAN(Virtual LAN) vulnerability Working principle of DTP(Dynamic Trunking Protocol) Hopping attack using DTP vulnerability VLAN Hopping attack using DTP vulnerability Working principle of 802.1Q VLAN Hopping attack using 802.1Q Native VLAN vulnerability (Double Tagging) IoT Security Coordinator Training course
TRACK | COURSE FOR | DURATION |
Incident Response | IoT home appliances developers |
5 Days (8 Hours per day) |
IoT Objective of the course is understanding various security threats in IoT and responding to the threats as a IoT security coordinator. This course covers from basic concept and terms of information security to deep IoT security.
Learn the methodologies, tools, and manual IoT techniques used real-life situations. A lots of high-quality practical training and tools for training like JTAG are prepared. Gain the in demand career skills of a IoT security coordinator. Receive ‘IoT security coordinator’ certificate.
Understanding of IoT security Basic concept of information security Information security principles Trends on IoT security IoT threat model Understanding of cryptology - Software vulnerabilities Symmetric cryptography algorithm Asymmetric cryptography algorithm Digital certificate SSL/TLS Security threats in cryptology Encrypted key exchange Memory analysis Encryption key storage Side channel attack Insecure random numbers Debugging interface security threats UART Exploitation JTAG Exploitation Firmware security threats What is firmware? Firmware security threats Secure boot S/W security threats Major software vulnerabilities Secure coding guidelines Memory Corruption Command injection Improper error handling TOCTOU SQL Injection Cross Site Scripting Cross Site Request Forgery Network security threats Sniffing Spoofing Man In The Middle(MITM) attack Hacking wireless networks with SDR
© copyright(c) 2017 CORESECURITY all right reserved.