CertNexus CyberSAFE Training Course
Regardless of your prior computer experience, this course is designed to enhance your awareness of technology-related risks and equip you with the knowledge to protect both yourself and your organization. Upon completion, you will be able to:
- Grasp the requirements and needs for security compliance.
- Identify and evade phishing attempts and other forms of social engineering.
- Detect and avoid viruses, ransomware, and other malicious software.
- Ensure data security across computers, mobile devices, networks, the Internet, and cloud environments.
Through interactive discussions, real-world case studies, and insights shared by the instructor and peers, you will explore the potential hazards of technology and learn how to utilize it safely and securely.
This course is available as onsite live training in Uzbekistan or online live training.Course Outline
Lesson 1: Identifying Security Compliance Measures
- Identify organizational compliance requirements and resources
- Identify legal compliance requirements and resources
Lesson 2: Recognizing and Addressing Social Engineering Attacks
- Recognize social engineering attacks
- Defend against social engineering attacks
Lesson 3: Securing Devices
- Maintain the physical security of devices
- Utilize secure authentication methods
- Protect your data
- Defend against malware
- Use wireless devices securely
Lesson 4: Using the Internet Securely
- Browse the web safely
- Use email securely
- Use social networks securely
- Use cloud services securely
- Work from remote locations securely
Requirements
To ensure your success in this course, you should possess basic proficiency with conventional end-user technology. This includes familiarity with desktop, laptop, or tablet computers, mobile phones, and fundamental Internet functions such as web browsing and email.
Need help picking the right course?
uzbekistan@nobleprog.com or +919818060888
CertNexus CyberSAFE Training Course - Enquiry
CertNexus CyberSAFE - Consultancy Enquiry
Testimonials (3)
Experience sharing, it's teacher's know-how and valuable.
Carey Fan - Logitech
Course - C/C++ Secure Coding
get to understand more about the product and some key differences between RHDS and open source OpenLDAP.
Jackie Xie - Westpac Banking Corporation
Course - 389 Directory Server for Administrators
the knowledge of the trainer was very high - he knew what he was talking about, and knew the answers to our questions
Adam - Fireup.PRO
Course - Advanced Java Security
Related Courses
389 Directory Server for Administrators
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is designed for system administrators who wish to use 389 Directory Server to configure and manage LDAP-based authentication and authorization.
Upon completing this training, participants will be capable of:
- Installing and configuring 389 Directory Server.
- Grasping the features and architectural framework of 389 Directory Server.
- Configuring the directory server using both the web console and CLI.
- Establishing and monitoring replication to ensure high availability and load balancing.
- Managing LDAP authentication via SSSD for enhanced performance.
- Integrating 389 Directory Server with Microsoft Active Directory.
ABAP Secure code
14 HoursUpon completing this training, participants will be capable of:
- Explaining application security and potential vulnerabilities
- Describing ABAP programming best practices and the handling of SY-SUBRC
- Understanding injection vulnerabilities
- Describing security testing tools
- Explaining ATC and CVA
Course Format
- Interactive lectures and discussions
- Extensive exercises and practical work
- Hands-on implementation in a live-lab environment
Active Directory for Admins
21 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at system administrators who wish to use Microsoft Active Directory to manage and secure data access.
By the end of this training, participants will be able to:
- Set up and configure Active Directory.
- Set up a domain and define access rights of users and devices.
- Manage users and machines through Group Policies.
- Control access to file servers.
- Set up a Certificate Service and manage certificates.
- Implement and manage services such as encryption, certificates, and authentication.
Applications Security Foundation
21 HoursThis course addresses the essential secure coding topics pertinent to a wide range of web application developers. It instructs students on the principles of secure programming by examining specific code snippets, identifying security vulnerabilities, and implementing corrective measures.
Participants will observe demonstrations of real-world attacks and learn effective prevention strategies, building confidence as they work to enhance their applications' security.
Duration: 3 days
Who Should Attend: Developers seeking to expand their expertise in secure coding.
Upon Completion
• Students will gain knowledge in:
• Web Application Security.
• Common Web Application Risks.
• Demo Web Application Penetration Testing.
• Data Validation.
• Authentication.
• Session Management.
• Secure SDLC.
Android Security
14 HoursAndroid serves as an open platform for mobile devices, including smartphones and tablets. While it offers a wide array of security features designed to facilitate the development of secure software, it also lacks certain security aspects found in other handheld platforms. This course provides a comprehensive overview of these features and highlights critical shortcomings related to the underlying Linux system, the file system, and the general environment, as well as those associated with permissions and other Android software development components.
Common security pitfalls and vulnerabilities are explained for both native code and Java applications, accompanied by recommendations and best practices to prevent and mitigate these issues. The topics discussed are often supported by real-life examples and case studies. Finally, the course briefly covers how to utilize security testing tools to identify security-related programming bugs.
Participants attending this course will
- Understand the fundamental concepts of security, IT security, and secure coding
- Learn about security solutions on Android
- Learn to use various security features of the Android platform
- Gain information about recent Java vulnerabilities on Android
- Learn about typical coding mistakes and how to avoid them
- Understand native code vulnerabilities on Android
- Recognize the severe consequences of insecure buffer handling in native code
- Understand architectural protection techniques and their weaknesses
- Access sources and further readings on secure coding practices
Audience
Professionals
Network Security and Secure Communication
21 HoursDeveloping a secure networked application is challenging, even for developers familiar with cryptographic building blocks like encryption and digital signatures. To help participants grasp the role and application of these cryptographic primitives, the course establishes a solid foundation on the core requirements of secure communication: secure acknowledgment, integrity, confidentiality, remote identification, and anonymity. It also highlights common threats to these requirements and presents real-world solutions.
Given that cryptography is a critical component of network security, the course examines the most important cryptographic algorithms in symmetric cryptography, hashing, asymmetric cryptography, and key agreement. Rather than focusing on complex mathematical theories, these topics are approached from a developer’s perspective, featuring typical use-case examples and practical considerations such as public key infrastructures. The course introduces security protocols used in various areas of secure communication, with an in-depth exploration of widely adopted protocol families like IPSEC and SSL/TLS.
Typical cryptographic vulnerabilities are discussed, both concerning specific algorithms and protocols. Examples include BEAST, CRIME, TIME, BREACH, FREAK, Logjam, Padding oracle, Lucky Thirteen, POODLE, and RSA timing attacks. For each issue, practical implications and potential consequences are explained without delving into deep mathematical details.
Finally, as XML technology is central to data exchange in networked applications, the course covers XML security. This includes the use of XML in web services and SOAP messages, alongside protection mechanisms like XML signature and XML encryption. The course also addresses weaknesses in these protection measures and XML-specific security issues such as XML injection, XML external entity (XXE) attacks, XML bombs, and XPath injection.
Participants attending this course will
- Understand basic concepts of security, IT security, and secure coding
- Understand the requirements of secure communication
- Learn about network attacks and defenses at different OSI layers
- Gain a practical understanding of cryptography
- Understand essential security protocols
- Understand some recent attacks against cryptosystems
- Get information about some recent related vulnerabilities
- Understand security concepts of Web services
- Get sources and further readings on secure coding practices
Audience
Developers, Professionals
C/C++ Secure Coding
21 HoursThis three-day course provides an overview of securing C/C++ code against malicious actors who may exploit vulnerabilities related to memory management and input handling. The course emphasizes the core principles of writing secure code.
Advanced Java Security
21 HoursEven seasoned Java developers often do not fully master the diverse security services provided by Java, and may remain unaware of the various vulnerabilities pertinent to web applications built with Java.
Beyond introducing the security components of Standard Java Edition, this course addresses security challenges in Java Enterprise Edition (JEE) and web services. Discussions on specific services are preceded by foundational knowledge of cryptography and secure communication. A range of hands-on exercises explores both declarative and programmatic security techniques within JEE, while also covering transport-layer and end-to-end security for web services. Participants will gain practical experience by applying the discussed APIs and tools through multiple real-world scenarios.
The course further examines the most common and critical programming flaws inherent to the Java language and platform, as well as web-related vulnerabilities. In addition to typical coding mistakes made by Java developers, the introduced security issues encompass language-specific problems and those arising from the runtime environment. Each vulnerability and associated attack vector is illustrated through clear, easy-to-follow exercises, followed by recommended coding practices and effective mitigation strategies.
Participants attending this course will
- Grasp fundamental concepts of security, IT security, and secure coding
- Learn about web vulnerabilities beyond the OWASP Top Ten and understand how to prevent them
- Comprehend security concepts specific to web services
- Learn how to leverage various security features within the Java development environment
- Acquire practical knowledge of cryptography
- Understand security solutions available in Java EE
- Identify typical coding errors and learn how to avoid them
- Gain insight into recent vulnerabilities affecting the Java framework
- Develop practical skills in using security testing tools
- Access resources and further reading materials on secure coding practices
Audience
Developers
FreeIPA for Administrators
14 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at system administrators who wish to use FreeIPA to centralize the authentication, authorization and account information for their organization's users, groups, and machines.
By the end of this training, participants will be able to:
- Install and configure FreeIPA.
- Manage Linux users and clients from a single central location.
- Use FreeIPA's CLI, Web UI and RPC interface to set up and manage permissions.
- Enable Single Sign On authentication across all systems, services and applications.
- Integrate FreeIPA with Windows Active Directory.
- Backup, replicate and migrate an FreeIPA server.
Blockchain: Hyperledger Indy for Identity Management
14 HoursIn this instructor-led, live training in Uzbekistan (online or on-site), participants will learn how to build an Indy-based decentralized identity system.
By the end of this training, participants will be able to:
- Create and manage decentralized, self-sovereign identities using distributed ledgers.
- Enable interoperability of digital identities across domains, applications, and silos.
- Understand key concepts such as user-controlled exchange, revocation, Decentralized Identifiers (DIDs), off-ledger agents, data minimization, and more.
- Use Indy to empower identity owners to independently control their personal data and relationships.
Identity and Access Management with Okta
14 HoursThis instructor-led, live training in Uzbekistan (online or on-site) is designed for system administrators who wish to use Okta for identity and access management.
By the end of this training, participants will be able to:
- Configure, integrate, and manage Okta.
- Integrate Okta into an existing application.
- Implement security using multi-factor authentication.
OpenLDAP Workshop
21 HoursThis instructor-led, live training in Uzbekistan (online or onsite) is aimed at intermediate-level system administrators and IT professionals who wish to install, configure, manage, and secure LDAP directories using OpenLDAP.
By the end of this training, participants will be able to:
- Understand the structure and operation of LDAP directories.
- Install and configure OpenLDAP for various deployment environments.
- Implement access control, authentication, and replication mechanisms.
- Use OpenLDAP with third-party services and applications.
Identity and Access Management using OpenAM
14 HoursThis instructor-led live training in Uzbekistan (online or onsite) is designed for system administrators who wish to use OpenAM to manage identity and access controls for web applications.
Upon completion of this training, participants will be able to:
- Configure the required server environment to begin setting up authentication and access controls using OpenAM.
- Implement single sign-on (SSO), multi-factor authentication (MFA), and user self-service features for web applications.
- Leverage federation services (OAuth 2.0, OpenID, SAML v2.0, etc.) to securely extend identity management across various systems and applications.
- Access and manage authentication, authorization, and identity services via REST APIs.
OpenDJ for Administrators
14 HoursThis instructor-led live training in Uzbekistan (available online or on-site) is targeted at system administrators who wish to use OpenDJ to manage their organization's user credentials in a production environment.
By the end of this training, participants will be able to:
- Install and configure OpenDJ.
- Maintain an OpenDJ server, including monitoring, troubleshooting, and optimizing for performance.
- Create and manage multiple OpenDJ databases.
- Backup and migrate an OpenDJ server.