Home Contact Us
 

Some feedback from OSSA attendees from the region:

"It is comprehensive course for beginners as well as for experienced security professionals to refresh their knowledge ... good trainer and good training materials which is practical and relevant to work "

Freddie Lee
CAPS Pte Ltd

 

"Very good knoweldge for security staff level and so many practical lab to do for getting idea on how to improve IT security system for company. Overall course is good. I ', readlly enjoy it. "

Pongsatorn Maneewatana
Philips Electronics

 

"This course should be recommended to the other that concern in IT security. This is an excellent course ."

Phumin Permsiri
G-Able Company Limited

OSSA(tm)

Enterprise Security

ORGANIZATIONAL SYSTEMS SECURITY ANALYST

Course Highlights

The Organizational Systems Security Analyst™ OSSA™ is an internationally-accredited practical and technical IT-security certification programme that teaches IT professionals how to secure an enterprise networks and systems.

Unlike “hacking” courses which typically focus on tools which can become ineffective very fast in the real world, the OSSA™ looks at security from a methodological perspective and draws lessons from Sun Tzu's "Art of War", introducing the practicalities of IT Security, and not just theory. It then populates the framework with resources and tools by which various security aims and objectives can be met. For these technical portions, although there is practical coursework, the aim is not to teach about the tool itself but about the category of usefulness that the tool falls into so that the course attendees can elect, on their own, the “best-of-breed” for the task at hand.

Course Objectives

With its emphasis on the use of Open-Source-based methodologies and tools to achieve the objective of network and Windows/Linux/Unix server security for organizations, the OSSA™ teaches a wide-ranging and vendor-independent approach to real-world planning, operational and legal issues surrounding IT-Security which both profit and non-profit organizations will encounter.

Course Benefits

Taught by certified and accredited trainers, this practical 5-day, hands-on security certification course is geared at equipping participants with the knowledge and practical technical skills necessary to secure their organizations from both internal and external threats, as well as understanding the impact of law on IT-Security policy and operations within the organization. At the end of the course, program participants will benefit with the following:

  • A top-to-bottom practical understanding of the real-life issues facing the IT Security Professional today, augmented by workbook-based lab work setting up a complete enterprise defensive network overlay.
  • The ability to advise their organizations about the various IT Security risks and how to mitigate them.
  • An understanding of the need to ensure that policies, procedures, people and platforms are executed and established in a secure manner.
  • The ability to conduct incident response and basic computer forensics.
  • An appreciation of the legal framework in which all organizations operate in and its impact on the organization.


Programme Outline:

Practical coursework is interspersed throughout the programme. The following is a brief course outline:

What is Information Security

  • Sun Tzu's Guiding Principle
  • Cybertacks
  • Cybertack Origins
  • Defining Security: Key Terms
  • The CIA Triad
  • The SOB Troika
  • The 8-Step Security Gameplan

Network 101

  • Sun Tzu's Guiding Principle - Sniff Me If You Can
  • Frames on the wire - Frames & Packets
  • Layer 4: Ordering The Mess - ARP, DNS & Routing
  • Sniffer Log Analysis

Defending your Turf & Security Policy Formulation

  • Sun Tzu's Guiding Principle - This LANd Is Mine
  • Due Diligence - Building A Policy
  • The 4P Methodology of Defence

Defensive Tools & Lockdown

  • Sun Tzu's Guiding Principle
  • Firewalls
  • Lab Network Firewall Deployment & Configuration
  • NIDS (Network-based Intrusion Detection System)
  • Lab Network NIDS Deployment & Configuration
  • HIDS/FIC (Host-based IDS & File Integrity Checkers)
  • Lab Network HIDS/FIC Deployment & Configuration
  • Honeypots
  • Lab Network Honeypot Deployment & Configuration
  • Cryptography: VPNs, Digital Signatures & GPG
  • Lab Network GPG Deployment & Configuration

The 5E Attacker Methodology: Attacker Methods & Exploits

  • Sun Tzu's Guiding Principle
  • Anatomy of an attack: The 5E’s
  • Preparation & Tools Repository
  • Sandboxing
  • Social Engineering, Dumpster Diving & Physical Violation
  • Browsers, WHOIS & DNS as attack tools
  • War Driving, Network Mapping & Port Scanning
  • OS Determination & Fingerprinting
  • Vulnerability & Web Scanning (network & web- based )
  • Spoofing, Session Hijacking, MITM
  • DoS & DDoS: Botnets & Zombies
  • Exploit Fundamentals: Buffer Overflow & Heap Overflow
  • Format String Vulnerability
  • Metasploit Framework & Exploit Code compilation
  • Web Application Vulnerabilities
  • Password Cracking
  • Backdoors & Covert Channels
  • Trojans & Rootkits
  • File Hiding, Log Modification & Executable Removal

Wireless (In)Security Introduction

  • Sun Tzu's Guiding Principle
  • WLAN Security Basics: WEP, WPA-PSK, WPA/WPA2
  • Warchalking & Cantennas
  • Typical WLAN Deficiencies

Incident Response & Computer Forensics

  • Sun Tzu's Guiding Principle
  • Case Study Part I: Incident Response
  • Incident Response Framework
  • Computer Forensics Introduction
  • The Role of a CFI
  • Chain of Custody
  • Data Acquisition
  • Information Gathering: Web & Code Forensics Analysis
  • Case Study Part II: Computer Forensics

The Impact Of Law

  • Sun Tzu's Guiding Principle
  • Why You Need To Know
  • The State Of Cybercrime Law
  • Problems with Enforcement
  • Case Study Part III: Legal Issues


Who Can Benefit From This Programme
:

IT-Security Professionals, Network Designers, Security Testers, Network Administrators, System Administrators/Analysts, Application Designers/Specialists, IT Managers/Engineers and anyone who wants or needs to know how to secure their infrastructure or is looking to get into the IT-Security industry.


Enterprise Security Certification


This course emphasizes on practical coursework and certification is awarded on the basis of a OSSA™'s
practical, lab-based certification exam, which is held on the last day of the course. The exam can also be taken separately during the next class run, by prior arrangement. The certification is not only an investment, but also help both the attendees and their companies to verify the true skill and capability of a security professional.


Course Leader

CHRISTOPHER LOW started his career in 1993 with the Infocomm Development Authority of Singapore (IDA), a government organization involved in the regulation of telecommunications in Singapore (formerly known as NCB). His role in IDA involved the development and implementation of large-scale government projects as well as conducting security and system audits. He was also involved in Census 2000, a nation-wide project, where he spearheaded the infrastructure and security setup of the entire operation.

Prior to that, Christopher worked at Sensecurity Institute as a technology director, covering a wide array of security fields such as biometrics, authentication systems, network- and host-based intrusion systems all the way to Single-Sign-On (SSO) solutions and IT-security training.

One of his passions in the training arena is to improve the overall security skillset of security professionals across all industries. Because of this, Christopher is an accomplished trainer, having developed the Sensecurity Institute Security Practitioner course and co-developing the Organizational Systems Security Analyst (OSSA™) programme, and he continues to teach various high profile security certification programmes such as ThinkSECURE’s Organizational Systems Security Analyst (OSSA™) programme and ISECOM's OSSTMM Professional Security Tester (OPST) course. He infuses his classes with experiences drawn from his real-world consulting experience and knowledge. A classic example of this is the probemapper wireless Client assessment tool which he released in Jan 2006, and his discovery of the WEP-Client-Communications-Dumbdown (WCCD) vulnerability in Dec 2005. Christopher is a frequent speaker at various security conferences covering broad ranging topics from web security to open source security and has been featured in the press.

MY Office : 72-3C, JALAN PUTERI 2/4, BANDAR PUTERI, 47100 PUCHONG, SELANGOR, Malaysia. Tel:+603-8063 9300 fax:+603-8063 9400
SG Office : 259, Onan Road, Singapore 424651. Tel: +65-6468 3325 Fax: +65-6764 5646