About this course
Web applications are the front-end servers that we connect to get our daily services: mail, WhatsApp, google, integrate you name it.
Because they are in the front we connect to them via public internet network.
Because there are specific rules how they are expose they are extremely vulnerable.
Do you know who those servers are also exposed to beside us? To others, which is everybody else include the hackers.
The hackers are people with specific agenda to target and damage those servers, those services using vulnerabilities that they explore every day.
IT security is one of the most evolving expertise in the last few years.
People who oversee securing the web services are dealing with the highest level of security knowledge.
IT security people must be sharp, on top of things and very creative.
If the hackers are exploring new vulnerabilities, IT security must explore new ways to secure the servers and their services.
This Course will put a spotlight on the two main tasks:
1) maintain servers security
2) check for vulnerabilities that hackers can exploit.
In this course we will learn both secure and check.
Audience profile
This course is for experienced information technology (IT) specialists. This is a step-up path to higher level of IT management and IT security.
At course completion
After completing this course, participates will be able to:
- Create a lab with your main corporate applications
- Secure the lab with best practices.
- Test your lab for vulnerabilities.
- Explore new ways to secure your lab
- The lab represents your real corporate servers environment.
Course details
At the end of each module there will be a practice lab and exercises.
Each module will have:
2 lessons, one practice lab and questions and answers from the specific module.
Module 1 – Terms and acronyms
In this module we go over technicals terms that are critical to understand further topics of: security. These terms also comes from the world of network and system. Not deep dive but highly technical overview of those terms.
Module 2 – The Lab
In this module we will get to know the course lab and how to create a lab.
Module 3 – Common Attacks
In this module we will do both, secure our lab and test for vulnerabilities.
We will simulate few lnown attacks on web applications servers and data bases
Module 4- Best practices
In this module we will learn how to scan our servers envirnment and locate main security vulnerabilities and secure them with best practices provided by the companies represented in our lab.
Module 5 – Vulnerabilities check and management.
After you understood the lab environment the risks and vulnerabilities and you are ready to initiate the results and best practices in your production environment.
Module 6- building the plan
In this module we will learn how to gather top management and enroll them to build a plan to explain and demonstrate the current risks in your server environment and the results of your lab.
This module will explain how to build a plan to secure your environment.
Prerequisites
- Networking fundamentals, including common networking protocols, topologies, hardware, media, routing, switching, and addressing.
- Familiar with fundamentals IT servers: Active directory, DNS, DHCP, Group Policy, and IIS etc
- Familiar with basic Linux skills: Ubuntu, Apache etc.
- Familiar with basic security skills: antivirus, security updates, personal fire wall.
- Familiar with basic security regulations and secure information.
- Passing questionnaire.