Wednesday, May 17, 2017

ATTEND: THE KENYA CYBER SECURITY & ETHICAL HACKING SEMINAR 22-23 JUNE 2017,KSMS, NAIROBI KENYA

The Kenya Cyber Security & Ethical Hacking Seminar, 2017

Join us at this practical 2-day seminar to cement your learning and gain a deeper understanding of the latest cyber security threats, hacks and on how to harness the most up-to-date tools to mitigate your exposure and limit any damage from cyber-attacks.

Venue: The Kenya School of Monetary Studies (KSMS), Nairobi, Kenya.

Date:   22nd-23rd June 2017

Course Fee:   Ksh.46,200/- inclusive of 2 days attendance, 5-course meals, mega seminar kit & taxes.

Pay Scheme: Package of 4 Delegates get 1 Free Slot

 

Cyber Security Seminar: Background and Context
Cyber Security is very important in today’s networked world and is impacting every aspect of society including finance, healthcare, government, insurance, education, information, security and others.

Most of the security breaches in an organization arise from the lack of security awareness of employees.

The objective of this seminar is to teach each employee the nuances of the current Cyber Attacks and Cyber Crime happenings and how to defend themselves and their organization. Precaution is always better than cure.

 

Cyber Security Seminar:Topics To Be Covered

Day 1 (Session 1)

Being a Hacker

·         Why People Hack?

·         What people Hack?

·         What is information?

·         How much worth my Information is?

·         Types of Hackers

·         Approach of a Hacker

·         Steps in Hacking

Basics of Internet, Networking & Hacking

·         Types of network – LANs, WANs & WLANs

·         What is a Server?

·         What is an IP Address?

·         Client-Server Relationship Model

·         What is a port?

Information gathering by Hackers (How to protect your information?) (Practical)

·         How Hackers gather information about us?

·         Does everybody know about you?

·         Where do they get it?

o    Whois access (Demo)

o    Maltego (Demo)

o    123people.com (Demo)

o    Ipscaning (Demo)

o    Port scaning (Demo)

·         Network scanning & its tools (Demo)

·         What is Google and how does it work?

·         Google Hacking (Demo)

·         Accessing Public Cameras

·         Basic hacks (Demo)

·         How can Google hacking help an Ethical Hacker? (Demo)

Day 1 (Session 2)

Desktop/PC Security, Antivirus & IDS (Practical)

·         Types of viruses

·         What are anti viruses?

·         How they detect a virus?

·         Which Antivirus is best?

·         What is firewall?

·         What are Trojan & Spywares?

Web Security

·         Fundamentals of Web Security

o    How the web really works

o    Rattling the Locks

o    Looking through Tinted Windows – SSL

o    Having someone else do it for you – Proxies

·         Web Vulnerabilities

o    Scripting Languages

o    Top Ten Most Critical Web Application Vulnerabilities

o    Security Guidelines for Building Secure Web Applications

·         HTML Basics – A brief introduction

o    Reading HTML

o    Viewing HTML at its Source

o    Links

o    Proxy methods for Web Application Manipulation

Email Security

·         How E-mail Works

·         Safe E-mail Usage

o    Spam, Phishing and Fraud

o    HTML E-Mail

o    Attachment Security

o    Email Forging

Day 2 (Session 3)

Mobile Security

·         Android Phone Security

·         What Apps can do to harm you?

·         Dos &Donts for Mobile Phones

Wireless Security

·         What is WiFi?

·         What are public WiFi?

·         Can someone sniff our passwords?

·         How to protect our self from WiFi attacks?

Passwords Security

·         History of Passwords

·         Types of Passwords

o    Strings of Characters

o    Strings of Characters plus a token

o    Biometric Passwords

·         Build a Strong Password

·         Password Encryption

·         Password Cracking (Password Recovery)

·         Protection from Password Cracking

Social Media Security

·         Types of Social Media

·         Attacks on Social Media

·         Social Engineering Attacks

·         How to defend Facebook Account?

Cyber Abuse

·         What is cyber abuse?

·         Laws against Cyber Abuse

·         How to avoid cyber abuse

 

Cyber Security Seminar: Key Learning Points Include:-

  • Increasing Cyber Security Awareness 
  • Developing and Expanding a Cyber Security Strategy 
  • Realizing, Reacting and Evaluating A Cyber Security Attack 
  • Staying Ahead of the Curve: Looking at Tomorrow’s threats today 
  • Real and practical examples will be given throughout the day, including top-tips which you can take away and implement in your organization
  • Practical skillset in mitigating the risk from, malware, Trojans, hackers, tracker, cyber criminals and all online threats.

Cyber Security Seminar: Target Audience
The Seminar is designed for:-
-An audience who use computers and networks frequently but do not necessarily have a technical background in computer sciences.
-People with an IT background who need an additional skills in security technologies will also benefit from the seminar.
-Those who wish to develop a greater understanding of cyber security and for those who wish to brush up their knowledge.

 

Cyber Security Seminar: About Seminar

In this cyber world every detail about you can be exploited by someone. It's the very basic need to remain safe while surfing, downloading, sending and online transactions.
This is the center of gravity for our cyber security seminar, by providing all the key points to avoid getting hacked.

 

Limited slots are available for this Event.

For more information on participation, contact Catherine.

Profound Respects,

Ms. Catherine Wanja,

DelightAfrica Ltd,

DevTowers - 4th Floor, Suite 4A

Biashara Street, CBD Nairobi

P.O. Box 12269 - 00100, Nairobi Kenya

Land line: +254 722 533 771  Mobile : +254 700 221 221

Fax : 020 222 54 39

WhatsApp : +254 729 236 920
*‘**PromotingProfessionalism in Corporate Training**’*

 

To unsubscribe, please click unsubscribe here below


Read more...!
Google

Links

© 2007 by studio-ponsel Network