Libyan Academy For Telecom and Informatics

Cyber Security Bootcamp

With the increasing integration of systems and reliance on digital data in organizations and businesses, the need for cybersecurity teams has become critical to protect against growing digital threats.

Technology companies are prime targets for cyber attacks due to the amount of sensitive data and vital information they hold. That’s why internal cyber teams are an integral part of a company’s overall security strategy. They regularly scan systems and applications, analyze potential threats, and develop effective defense strategies. Thanks to these efforts, the company’s technology infrastructure is strengthened and security risks are reduced.

محاور المخيم :

  1. Introduction
  • Basic TCP/IP knowledge
  • Basic IT network
  • Basic security for IT
  • What is a NOC?
  • What is a soc?
  • What is pentesting?
  • What is the public cloud?
  • What is the private cloud?
  • What is the hybrid cloud?
  • What about ddos?
  • What is advanced threat ?
  • What is a malware ?
  • What is ransomware ?
  • What is blue team ?
  • What is red team ?
  1. Cybersecurity state of art
  • Firewalls organization
  • WAF
  • IPs
  • Loadbalancer
  • Antivrus
  • DMZ
  • Ddos
  • Proxy/reverse proxy
  • Authentification
  • NDR
  1. Network and application performance state of art
  • Understand the network , legacy and new technology ( lan , wan , sdwan ,…)
  • Understand the nework monitoring
  • Understand the challenges for application
  • Understand the challenges for application monitoring
  • Netscout ngone
  • Netscout ngpulse
  1. Advanced threat
  • What are the challenges for soc team version1 ?
  • Why siem can’t meet the new challenges ?
  • Why you need to understand the ndr and its benefits ?
  • What it ndr ? network detection and response.
  • Netscout ndr solution
  • What is the pfs technology ? why it is important.
  • Netscout probe for advanced threat
  1. New edge cybersecurity protection
  • the cybersecurity challenges for the new edge
  • inbound cyber attack to the edge
  • inbound or outbound malicious communication
  • additional contextual threat intelligence to blocked iocs
  • hunting for iocs using isng
  • understand arbor edge defense
  • using arbor edge defense to stop inboud threats
  • using arbor edge defense to stop outbound threats
  1. Sightline and tms and isp global protection
  • Understanding the new network of isp
  • Understand the challenges facing isp
  • Understand the risk to have global availability for isp
  • Provision new customers for ddos detection and protection services
  • Configure sightline utilities to assist with ddos attack detection
  • Configure sightline settings to mitigate ddos attacks with or without the tms
  • Configure sightline manual or auto mitigation options for ddos attack mitigation
  • Leverage tms redundancy and orchestration option
  • What is red team and blue team ?
  • What you should know to be ready to face attacks ?
  • Using arbor edge defense for application layer protection.
  • Using sightline/tms for voumetric protection.
  • Playing the role of attacker.
  • Playing the role to defend using arbor edge defense.

Cyber Security Bootcamp Q & A

Qualifying participants to work within cyber security teams to protect institutions and companies. Training on protection tools and network monitoring.
20 trainees in each camp from students and new graduates
Intensive training on networking principles and the latest cybersecurity technologies from one of the world's leading cybersecurity companies. Learn network monitoring and protection tools Join a community of technologists and developers. Practical activities, training and awareness workshops. A certificate accredited by the academy.
6 weeks – 180 training hours 150 hours of work and study.
Knowledge of networking and cloud computing basics. The applicant must be between 28 and 20 years old. Pass the competitive exam and personal interview. Educational materials to prepare for the competitive exam 1.Getting Started in IT https://vmware.bravais.com/s/bjOyL9ppvPttxD6BefbO 2.Cloud and Virtualization Concepts https://www.netdevgroup.com/online/courses/cloud/cloud-and-virtualization-concepts