Cyber warfare is unfortunately no longer found only in science fiction stories; it is with us today. Distributed denial-of-service (DDoS) attacks have been launched against many military and government computer systems around the world in recent years. The technological advancements in computers, software, networks and information systems in general have actually made technologically dependent countries more vulnerable to disruption. Physical security is now permanently tied to cyber security. Cyber weapons are a relatively new type of weaponry with various effects on the target.

They are usually basic scripts that have the objective to defend or attack a target. It doesn't have any limitations of use and can achieve most of the goals set. Most of them are freely available on the internet but some more sophisticated or newer ones are kept privately or are commercial. Securing infrastructure against cyber attacks has become one of every nation’s highest priorities. To achieve this objective, networks, systems, and the operations teams that support them must be fully trained and aware of possible threats and strongly defend against a variety of threats.

The objective of this seminar is to provide practical and usable information to professionals on how to protect both infrastructure and data from the destruction of cyber terrorism and associated cyber crimes.

What you will learn:
  • Understand the basic principles and philosophies of cyber terrorism and how individuals and corporations can be targeted
  • Identify possible threats facing your organization information assets and infrastructure
  • Provide your organization with complete assessment of organizational security policy, design and implementation.
  • What are legal constraints on cyber warfare
  • Main defence strategy

Have a working knowledge of the current risks, threats and exposures facing 21st century organizations doing business in virtual global marketplaces

Course Outline
  • Introduction to Cyber warfare & Cyber intelligence
  • Defining Cyber Vandalism
  • Critical National infrastructure
  • Information as resources
  • Information gathering techniques and tools
Information Warfare
  • Advance information gathering and techniques
  • Network tracing, port scanning and OS fingerprint
  • Live information gathering and detecting live systems
Cyber Doctrine and Strategy
  • Setup Cyber war lab
  • The Digital Battlefield
  • Tactical Network communication system
  • Infrastructure
Cyber Weapons & Cyber Attack
  • Cross-site scripting (XSS)
  • Social engineering
  • SQL injections
  • Cookie manipulation
  • Directed Energy Weapons
  • FTP, POP3, SNMP Bruteforce
  • Offline password Attack
  • Rainbow Tables
Cyber Crime and Investigation
  • Introduction to cyber crime
  • What is cyber investigation
  • Handling Real world investigation
  • Digital Forensics
  • Performing the Forensics Process
Computer Emergency Response Teams
  • Disaster recovery & Handling security incidents or vulnerabilities
Cyber Attack Case Study
Pre requirement
  • A fair understanding of computer and network security
  • Participants are required to bring along a Laptop for training

Contact Us in Singapore

  • Blk 4010 #04-08
    Techplace 1, Ang Mo Kio Ave 10
    Singapore (569626)
  • One Pemimpin #01-03, 1 Pemimpin Drive,
    Singapore (576151)
  • Phone:  +65 6262 -2072
  • Fax:        +65 6554 -7259
  • Genernal Enquiry: [email protected]
  • Alibaba Related: [email protected]

Contact Us in Myanmar

  • No.(47) Thazin Street,
    IGS Building, Ahlone Township,
    Yangon, Myanmar
  • Phone:  +95 11 220 449
  • Fax:        +95 11 220 366
  • [email protected]

Contact Us in China

  • No.886, Xiahe Road,
    #20-108 World Trade Mall
    Xiamen, Fujian, China
  • Blk C1 #910-911, Baoli Central,
    No. 1 Jing Xiu Road, Wu Hou District,
    Chengdu, Sichuan, China
  • [email protected]