‫أﻛﺎدﯾﻣﯾﺔ اﻟﺣﻛوﻣﺔ اﻹﻟﻛﺗروﻧﯾﺔ اﻟﻔﻠﺳطﯾﻧﯾﺔ‬        The Palestinian eGovernment Academy                         www.egovacadem...
AboutThis tutorial is part of the PalGov project, funded by the TEMPUS IV program of theCommission of the European Communi...
© Copyright NotesEveryone is encouraged to use this material, or part of it, but should properlycite the project (logo and...
Tutorial 5:                   Session 0 - ILO’sAfter completing this session you will be ableto:      •Learn about the Sec...
Tutorial 5:            Information SecurityIntroduction to Inf. Security TutorialTutorial Outline:  • Inf. Security Intend...
Tutorial 5:             Information SecuritySecurity Intended Learning Outcomes  This tutorial is designed to provide the ...
Tutorial 5:         Security Learning Objectives (1)• Understand the importance of taking a   systems wide approach to mai...
Tutorial 5:           Security Learning Objectives (2)• Understand the motivation, design,  operation and management of mo...
Tutorial 5:       Security Learning Objectives (3)• Be able to make informed choices of the  appropriate security measures...
Tutorial 5:                   Training Sessions•   Session 1 : Introduction to E-government security and    ISO 27000 stan...
Security Tutorial Time Table / Topics Schedule                  Run 1: 21/2/2012 - 11/3/2012                              ...
Security Tutorial Time Table / Topics Schedule                            Run 1: 21/2/2012 - 11/3/2012                    ...
Security Tutorial Time Table / Topics Schedule                            Run 1: 21/2/2012 - 11/3/2012                    ...
Security Tutorial Time Table / Topics Schedule                          Run 1: 21/2/2012 - 11/3/2012                      ...
Security Tutorial Time Table / Topics Schedule                        Run 1: 21/2/2012 - 11/3/2012                        ...
Security Tutorial Time Table / Topics Schedule                         Run 1: 21/2/2012 - 11/3/2012                       ...
Other DaysPlease See the Security TutorialTime Table File in the Drop Box                 PalGov © 2011     17
Thanks     Radwan Tahboub            PalGov © 2011   18
Upcoming SlideShare
Loading in …5
×

E gov security_tut_session_0

971 views

Published on

Published in: Education, Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
971
On SlideShare
0
From Embeds
0
Number of Embeds
170
Actions
Shares
0
Downloads
22
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

E gov security_tut_session_0

  1. 1. ‫أﻛﺎدﯾﻣﯾﺔ اﻟﺣﻛوﻣﺔ اﻹﻟﻛﺗروﻧﯾﺔ اﻟﻔﻠﺳطﯾﻧﯾﺔ‬ The Palestinian eGovernment Academy www.egovacademy.ps Tutorial 5: Information Security Session 0 Outline and Motivation Reviewed byProf. David Chadwick and Prof. Hani Ragab Hassan, Kent University, UK PalGov © 2011 1
  2. 2. AboutThis tutorial is part of the PalGov project, funded by the TEMPUS IV program of theCommission of the European Communities, grant agreement 511159-TEMPUS-1-2010-1-PS-TEMPUS-JPHES. The project website: www.egovacademy.psProject Consortium: Birzeit University, Palestine University of Trento, Italy (Coordinator ) Palestine Polytechnic University, Palestine Vrije Universiteit Brussel, Belgium Palestine Technical University, Palestine Université de Savoie, France Ministry of Telecom and IT, Palestine University of Namur, Belgium Ministry of Interior, Palestine TrueTrust, UK Ministry of Local Government, PalestineCoordinator:Dr. Mustafa JarrarBirzeit University, P.O.Box 14- Birzeit, PalestineTelfax:+972 2 2982935 mjarrar@birzeit.eduPalGov © 2011 2
  3. 3. © Copyright NotesEveryone is encouraged to use this material, or part of it, but should properlycite the project (logo and website), and the author of that part.No part of this tutorial may be reproduced or modified in any form or by anymeans, without prior written permission from the project, who have the fullcopyrights on the material. Attribution-NonCommercial-ShareAlike CC-BY-NC-SAThis license lets others remix, tweak, and build upon your work non-commercially, as long as they credit you and license their new creationsunder the identical terms. PalGov © 2011 3
  4. 4. Tutorial 5: Session 0 - ILO’sAfter completing this session you will be ableto: •Learn about the Security tutorial sessions and content. •Learn about the training sessions schedule/content. PalGov © 2011 4
  5. 5. Tutorial 5: Information SecurityIntroduction to Inf. Security TutorialTutorial Outline: • Inf. Security Intended Learning Outcomes and Objectives. • Training Sessions Outline PalGov © 2011 5
  6. 6. Tutorial 5: Information SecuritySecurity Intended Learning Outcomes This tutorial is designed to provide the participants with: • Understanding of the concepts underlying Secure Information Systems. • Experience in the use of security tools and techniques to build secure systems. • Hands-on experience in the design and implementation of secure systems. PalGov © 2011 6
  7. 7. Tutorial 5: Security Learning Objectives (1)• Understand the importance of taking a systems wide approach to maintaining information security, and the balance between risk and expenditure.• Have an understanding of the threats faced by computer operating systems, applications and networks (especially the Internet) and the various countermeasures that can be used;• Have a basic understanding of the algorithms used inPalGov © 2011 cryptography; 7
  8. 8. Tutorial 5: Security Learning Objectives (2)• Understand the motivation, design, operation and management of modern systems for encryption, authentication, authorization and identification.• Have an understanding of the various techniques used in identity management;• The ability to analyze the information security requirements of an organization.• Skills to use the appropriate software tools, techniques and packages to produce and develop security systems. PalGov © 2011 8
  9. 9. Tutorial 5: Security Learning Objectives (3)• Be able to make informed choices of the appropriate security measures to put into place for a given network, operating system or application;• Be able to undertake practical exercises related to securing computer systems;• The ability to critically appraise an existing secure system (from an architectural point of view) PalGov © 2011 9
  10. 10. Tutorial 5: Training Sessions• Session 1 : Introduction to E-government security and ISO 27000 standards.• Session 2: Internet Risks and Attacks• Session 3: Authentication• Session 4: Authentication Lab• Session 5: Certificates and Biometric Authentication• Session 6: Certificates and Https Lab• Session 7: Firewalls and VPN• Session 8: Firewalls and VPN and Biometric Lab• Session 9: Federated Identity Management (FIM).• Session 10.1: Wireless Security (from session 12)• Session 10: Wireless Security Lab• Session 11: Access Control• Session 12: Auditing and Wireless security PalGov © 2011 10
  11. 11. Security Tutorial Time Table / Topics Schedule Run 1: 21/2/2012 - 11/3/2012 Day 1 Tuesday 21 / 2/ 2012 8:30 - 16:30 Topics Approx Instructor Number of Hours Sessions 0 and 1 : Introduction• Security Tutorial outline 0.5 Dr. Radwan Tahboub• E-governments and security 1.5• Introduction to security and threats (CIA) o Break (5 minutes)• ISO 27000 standards. 1.5 Lunch Break (20 minutes) Session 2: Internet Risks and Attacks• Attacks on Internet Stack (routing, IP, DNS, 1.5 Dr. Mohammad Jubran UDP.• DOS and DDOS 0.5 o Break (5 minutes)• Symmetric and Asymmetric Cryptography. 2.0 PalGov © 2011 11
  12. 12. Security Tutorial Time Table / Topics Schedule Run 1: 21/2/2012 - 11/3/2012 Day 2 Sunday 26/2/2012 8:30 – 16:30 Topics Approx Number Instructor of Hours Session 5: Certificates and Biometric Authentication Dr. Mohammad Jubran• PKI and X.509 1• SSL/TLS and IPSEC 1 o Break (5 minutes)• Biometric authentication and smart cards. 1.5 Lunch Break (20minutes) Session 3: Authentication• Authentication (symmetric and asymmetric 1.5 Dr. Radwan Tahboub• One time password) 1 o Break (5 minutes)• Introduction to LDAP 1.5 PalGov © 2011 12
  13. 13. Security Tutorial Time Table / Topics Schedule Run 1: 21/2/2012 - 11/3/2012 Day 3 Tuesday 28/2/2012 8:30 – 16:30 Topics Approx Instructor Number of Hours Session 4: Authentication Lab• Install apache and use basic authentication and hashed 1.5 Eng. Ghannam Aljabary password files. o Break (5 minutes) Supervised by• Basic authentication 1 Dr. Mohammad Jubran• Open SSL certificate and certificate authority 1 Lunch Break (20minutes) Session 6: Certificates and HTTPS Lab• Apache with LDAP authentications. 1 Eng. Ghannam Aljabary• SSL practical (basic authentication over SSL, 1.5 HTTPS) Supervised by o Break (5 minutes) Dr. Mohammad Jubran• Install open LDAP 1.5• Apache with LDAP authentications PalGov © 2011 13
  14. 14. Security Tutorial Time Table / Topics Schedule Run 1: 21/2/2012 - 11/3/2012 Day 4 Sunday 4/3/2012 8:30 – 16:30 Topics Approx Instructor Number of Hours Session 7: Firewalls and VPN• Firewalls 1.5 Dr. Nael Salman• VPNs 1 o Break (5 minutes) 1• Microsoft Firewall Lunch Break (20minutes) Session 11: Access Control• Introduction to Access control 2 Dr. Radwan Tahboub o Break (5 minutes)• Database Security at a glance 1.5 PalGov © 2011 14
  15. 15. Security Tutorial Time Table / Topics Schedule Run 1: 21/2/2012 - 11/3/2012 Day 5 Tuesday 6/3/2012 8:30 – 16:30 Topics Approx Instructor Number of Hours Session 9: Introduction to FIM• Federated Identity Management. (FIM) Dr. Radwan Tahboub Lunch Break (20minutes) Session 12: Other Issues• Security Auditing 1.5 Dr. Radwan Tahboub o Break (5 minutes)• Wireless Security Protocols 2.5 PalGov © 2011 15
  16. 16. Security Tutorial Time Table / Topics Schedule Run 1: 21/2/2012 - 11/3/2012 Day 6 Sunday 11/3/2012 8:30 – 16:30 Topics Approx Instructor Number of Hours Session 10: Wireless Lab• Wireless Security Access Points 1.5 Eng. Ghannam Aljabary o Break (5 minutes) Supervised by• Wireless Security Authentication Protocols 2.5 Dr. Radwan Tahboub (WEP, WPA, WPA-RADIUS) Lunch Break (20minutes) Session 8: Firewalls Lab• Fingerprints authentications (Demo). 1 Eng. Ghannam Aljabary o Break (5 minutes) Supervised by• Firewall installation. 2.0 Dr. Nael Salman PalGov © 2011 16
  17. 17. Other DaysPlease See the Security TutorialTime Table File in the Drop Box PalGov © 2011 17
  18. 18. Thanks Radwan Tahboub PalGov © 2011 18

×