Share
AppSec Engineer II, Bentley Systems
Objectives: - Create honeypot environments on Amazon Web Services (AWS) to get the attacks. -> Build the required EC2 instance. -> Create security groups with open ports. -> Review the analyze the logs. - SCADA Vulnerabilities: enable the vulnerabilities listed below, in the SCADA honeypot environment. -> Lack of Input Validation -> Unauthenticated Access -> Insecure Network Protocols - Cyber attack: ->By executing the scrips, simulating the cyber attacks, and exploiting the identified vulnerabilities in the SCADA honeypots. - Traffic: -> Capture and analyze the traffic by implementing a system to log incoming network traffic. -> Analyze the logs/data by using the Python’s Panda library to identify the attack patterns and techniques. - Enable IDS: -> Enable the Intrusion Detection System within the honeypots. -> Capture the detect suspicious activities and unauthorized access attempts.
This comprehensive Cyber Security Course is designed for current and aspiring professionals who are keen to explore and exploit the latest trends in Cyber Security Technologies. Through a perfect blend of academic rigor and practical training, this Cyber Security Certification Course equips participants with in-demand skills and empowers them to build world-class expertise.
With a comprehensive curriculum and 120 hours of hands-on training, this program equips participants with essential practical skills required for Cyber Security professionals. Through interactive live online sessions, learners have the opportunity to engage with expert instructors and industry practitioners, creating a dynamic learning environment that fosters knowledge exchange and skill development.