Fordefence training programs consist of main topics including "Theoretical and Technical Forensic Informatics Training, S.O.M.E. Training, Data Recovery Training, Information Security Awareness Training, White Hat Hacker Training, and Network Security Training." These programs aim to elevate fundamental informatics notions to a higher level through customizable training that blends theory and technique, catering to participants from all levels and professional backgrounds.
Network Security Training Duration: 3 Days
Participant Profile;
- Information Technology Employees
- Internal Auditors
- IT Auditors
- Web Application Administrators
- Network Administrators
- System Administrators
- Cybercrime Personnel
- Students
Requirements:
Basic: Knowledge of basic computer usage.
Technical: Computers with at least an Intel i7 processor, SSD, and 16 GB RAM for applications.
Training Location: Fordefence Forensic Informatics Laboratory (Fordefence Adli Bilişim Laboratuvarı / ŞİŞLİ / İSTANBUL)
Training Methodology:
- Theoretical Knowledge
- Sampling
- Practical Exercises
- Case Studies
- Interactive Participation
- Participation Certificate
Training Description;
The network security training program visually teaches the structural security vulnerabilities in the TCP/IP configuration, which is used worldwide and forms the basic infrastructure of the internet. Techniques and methods used by malicious attackers today are simulated and visually taught to participants.
By the end of the program, participants will gain knowledge about the structural flaws in the network and internet infrastructure. Participants will also be informed about potential attacks on the system, enabling them to foresee and prevent attacks on network and internet infrastructure.
The Fordefence team: strives to prevent malicious individuals from taking over your computers and networks.
Training Program;
Day 1
- What is TCP/IP?
- Basic TCP/IP Protocols
- Differences Between TCP and UDP
- Sniffing
- What is Sniffing?
- Sniffer Tools
- Wireshark
- Tcpdump
Day 2
- What is ARP?
- ARP Attacks
- ARP Poisoning
- LLMNR and NBT-NS Poisoning
- MAC Spoofing
- DNS Poisoning & Spoofing
- Session Hijacking
- What is SSL?
- Heartbleed
Day 3
- MITM & SSLStrip
- What is DoS/DDoS?
- HTTP Flood
- Wireless Network Attacks
- WEP Attack
- WPA/WPA2 Attacks
- Hidden SSID Detection
- Creating Fake Access Points
- De-authentication Attack