Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Topics Include:
The Backdrop for Mobile Security
Changes in the application landscape
State of the art in mobile threats
Issues with the current approaches to enterprise security
Aruba Networks / Palo Alto Networks Integration
Introduction to the Palo Alto Networks Network Security Platform
Integration points with Aruba Networks ClearPass Guest
Wireless Network Security Palo Alto Networks / Aruba Networks Integration
Topics Include:
The Backdrop for Mobile Security
Changes in the application landscape
State of the art in mobile threats
Issues with the current approaches to enterprise security
Aruba Networks / Palo Alto Networks Integration
Introduction to the Palo Alto Networks Network Security Platform
Integration points with Aruba Networks ClearPass Guest
Last Update: 28 Jan 2021
TONEX 5G security training is an essential element in the development of security policies and technologies to protect 5G wireless networks from hacking, cyberattacks and financial fraud.
Topics Include:
Security 5G Essentials Bootcamp Style
TONEX 5G Security Workshop/Recommendations
Security 5G Essentials Bootcamp Style:
Intro to 5G Security
5G communications systems architecture
Security Issues and Challenges in 5G Communications Systems
Mobile Malware Attacks Targeting UE
ITU-T and 3GPP Security Frameworks
LTE, LTE-Advanced and LTE-Pro Security Principles
LTE-U and LAA Security
802.11ax Security applied to 5G
802.11ah Security applied to 5G
802.11ay Security applied to 5G
Self-Organizing Network (SON)
Voice over WiFi (VoWiFi) Security
LTE Direct and D2D Communication Security
IoT Security
NFV Security
Software Defined Networking (SDN) Security
Cloud and Virtualization Security
C-RAN Security
V2V Security
Securing 5G Automation
5G Monitoring and Security Operations
Cloud Security applied to 5G
LTE-Advanced, LTE-Pro and 5G Network Penetration Testing and Ethical Hacking
Active 5G Defense, Offensive Countermeasures and Cyber Deception
Implementing and Auditing 5G Security Controls
Social Engineering for 5G Penetration Testers
5G UE Security and Ethical Hacking
5G Virtualization and Private Cloud Security
5G Wireless Ethical Hacking, Penetration Testing, and Defenses
Advanced LTE, LTE-Advanced ,LTE-Advanced Pro, and 5G Exploit Development for Penetration Testers
5G Forensics Analysis
Advanced 5G Forensics, Incident Response, and Threat Hunting
5G Cyber Threat Intelligence
Advanced 5G Forensics: Applied to IoT, V2V and Autonomous Things
Reverse-Engineering 5G Analysis Tools and Techniques
5G Cyber Security Risk Management
5G Security Automation, Incident Response Team Management
Secure DevOps
5G Data Security and Investigations
Physical 5G Penetration Testing
Physical Wireless Access Control Systems Elements of Design, Offense/Defense
5G Mobile Botnets
Bot-masters and Bot-proxies
5G UE Location Tracking
TONEX 5G Security Workshop/Recommendations:
Key Issues
Embedded SIM Security
mmWave Security Issues
5G Autonomous Driving Security Solutions
Critical 5G Security Controls Planning, Implementing and Auditing
Top 5G Mitigation Strategies Implementing and Auditing
Advanced 5G Security Principles
5G Intrusion Detection
5G Wireless Hacker Tools, Techniques, Exploits and Incident Handling
Issues with Access Network Flash Network Traffic
Radio interface key management
User plane integrity
Security measures
DOS Attacks Against Network Infrastructure
Overload of the signaling plane security issues
Bulk configuration security issues
Learn more about 5G security training objectives, outline, pricing, audience, etc.
https://www.tonex.com/training-courses/5g-security-training/
Overview on the state of WIFI security for WEP, WPA/WPA2, WPA3. Looking at their protocols, weaknesses and attacks.
The presentation finishes with a live demo on 2 attacks: Karma Attack and Evil Portal Attack
Last Update: 28 Jan 2021
TONEX 5G security training is an essential element in the development of security policies and technologies to protect 5G wireless networks from hacking, cyberattacks and financial fraud.
Topics Include:
Security 5G Essentials Bootcamp Style
TONEX 5G Security Workshop/Recommendations
Security 5G Essentials Bootcamp Style:
Intro to 5G Security
5G communications systems architecture
Security Issues and Challenges in 5G Communications Systems
Mobile Malware Attacks Targeting UE
ITU-T and 3GPP Security Frameworks
LTE, LTE-Advanced and LTE-Pro Security Principles
LTE-U and LAA Security
802.11ax Security applied to 5G
802.11ah Security applied to 5G
802.11ay Security applied to 5G
Self-Organizing Network (SON)
Voice over WiFi (VoWiFi) Security
LTE Direct and D2D Communication Security
IoT Security
NFV Security
Software Defined Networking (SDN) Security
Cloud and Virtualization Security
C-RAN Security
V2V Security
Securing 5G Automation
5G Monitoring and Security Operations
Cloud Security applied to 5G
LTE-Advanced, LTE-Pro and 5G Network Penetration Testing and Ethical Hacking
Active 5G Defense, Offensive Countermeasures and Cyber Deception
Implementing and Auditing 5G Security Controls
Social Engineering for 5G Penetration Testers
5G UE Security and Ethical Hacking
5G Virtualization and Private Cloud Security
5G Wireless Ethical Hacking, Penetration Testing, and Defenses
Advanced LTE, LTE-Advanced ,LTE-Advanced Pro, and 5G Exploit Development for Penetration Testers
5G Forensics Analysis
Advanced 5G Forensics, Incident Response, and Threat Hunting
5G Cyber Threat Intelligence
Advanced 5G Forensics: Applied to IoT, V2V and Autonomous Things
Reverse-Engineering 5G Analysis Tools and Techniques
5G Cyber Security Risk Management
5G Security Automation, Incident Response Team Management
Secure DevOps
5G Data Security and Investigations
Physical 5G Penetration Testing
Physical Wireless Access Control Systems Elements of Design, Offense/Defense
5G Mobile Botnets
Bot-masters and Bot-proxies
5G UE Location Tracking
TONEX 5G Security Workshop/Recommendations:
Key Issues
Embedded SIM Security
mmWave Security Issues
5G Autonomous Driving Security Solutions
Critical 5G Security Controls Planning, Implementing and Auditing
Top 5G Mitigation Strategies Implementing and Auditing
Advanced 5G Security Principles
5G Intrusion Detection
5G Wireless Hacker Tools, Techniques, Exploits and Incident Handling
Issues with Access Network Flash Network Traffic
Radio interface key management
User plane integrity
Security measures
DOS Attacks Against Network Infrastructure
Overload of the signaling plane security issues
Bulk configuration security issues
Learn more about 5G security training objectives, outline, pricing, audience, etc.
https://www.tonex.com/training-courses/5g-security-training/
Overview on the state of WIFI security for WEP, WPA/WPA2, WPA3. Looking at their protocols, weaknesses and attacks.
The presentation finishes with a live demo on 2 attacks: Karma Attack and Evil Portal Attack
IT Professional with over 15 years of experience in planning, engineering, administration, maintenance, optimization , analysis and troubleshooting for various network technologies including VoIP, wireless and data center for medium to global enterprise environments which includes proficiency in routing, routing protocols, switching, WLAN, VPN, WiFi, security, firewalls, network performance and security assessment as well as post-assessment reports and recommendations.
1. CHANDRA HEBBAR
Mobile: +962 778477119 * E-Mail:chandrahebbar1981@gmail.com
To get associated with enterprise organization where opportunities exist for innovative and
challenging professionals and seeking quality work as well as environment where my knowledge is
enhanced and pursues a career growth prospects.
PROFILESUMMARY
• Offering8+ years of comprehensive experience in global planning,end to end IT infrastructureand Network
Administration( WAN & LAN)
• A visionary technocratwith strong abilities in liaisingwith other functional heads for technology development to
improve and execute plan,consistently trackingdevelopment againstplan and seekingstrategies for increasing
efficiencies and enhancingthe Return on investment (Technology Space).
• Responsiblefor plan/design/maintenanceof technology /Networking infrastructure.
• Extensive experience in managing& deliveringprojects,conductingbusiness analysis to determine requirements
and planningfor network implementation at the enterprise scale.
AREAS OF EXPERTISE
• Providingtechnology vision and publishingtechnology business plansin supportof corporateobjectives to grow
revenue baseand improve margins.
• Designingand applyingsolutions/policies thatwould meet or exceed functional,operational,performance,
analytical and security requirements while minimizingtechnical risksin implementation.
• Recommending network infrastructurerequirements and upgradingto ensure acceptablelevels of security,
Disaster management and Data Recovery plans.
• Ensuringthat goals of the incidentManagement process areachieved; restoringnormal serviceas soon as
possiblebased on customer perspective and within defined SLA.
• Detecting, logging, categorizingand prioritizingincidents and providinginitial incidentsupport.
• Managingnetwork assetinventory through the useful lifecycleof each asset.
EMPOLYMENT DETAILS
October-2015 – Till date with Classic Fashion Apparel Industry-Jordan as Senior Network
Engineer (Data and Voice).
Key Result Areas:
• Worked towards the achievement of the strategic and operational objectives of the group located across
multiplelocations in a 7x24x365 environment.
• Navigated the use of controls,tools,and best practices for the network security devices to identify anomalous
events and security infraction thatmay exploitsystem vulnerabilities thereby reducingtheir impact.
• Accountablefor the support, installation,maintenanceof:
• Switches, Routers, Firewalls
2. • Cisco Call Manager,Gateway, Unity, Presence
• 3CX Call Manager,Patton Gateway.
TECHNICAL PURVIEW (NETWORK DEVICES & APPLIANCES)
• Routers : Cisco 1800,2600,2800,3800,7200
• Switches : Cisco 2960,3560,3750,4500,6500
• Firewall : Cisco PIX,ASA 5510, 5540
• Fortigate
• Cyberoam
• Cisco VOIP : BE 6000,Gateway,Presence,Unity
• 3CX, Patton.
-------------------------------------------------------------------------------------------------------------------------------
17th September 2012 to 12th September 2015 with TEKSALAH LLC as Network Engineer (Data
and Voice)
Key Result Areas:
• Cisco 800,1800,2800,1900 & 2900 series Routers for ADSL, Internet Leased Line & IP-VPN (MPLS), routing,
NATing, Policy Based Routing,IPSEC VPN, Remote VPN, DMVPN, etc.
• Cisco 2900,3500 and 4500 CatalystSeries Switches for L2 & L3 Operations,VLAN InfrastructureDesigning
includingIP sub netting, Inter VLAN Routing, Spanning-Tree Optimal Root Bridge Selection, HSRP / VRRP / GLBP,
QoS, etc.
• Cisco PIX 500 Series & ASA 5500 series Firewalls for Basic Firewallingand for IPSEC VPN, Remote VPN etc.
• Cisco 5500 Series Wireless LANController, Cisco Lightweight Access Points for Mobility,HREAP etc.
• Fortigate UTMs for the Routing, VLAN Switching, Firewalling,Gateway Antivirus Protection,IPS, Category Based
Internet Access Control, and Layer 7 based Application Control,WirelessLAN InfrastructureSetup, and Reporting
etc.
• Cyberoam UTMs for Routing, Switching, Firewalling,Gateway Antivirus Protection,IPS, Category Based Internet
Access Control, Layer 7 Based Application Control,Reporting, etc.
• Riverbed Steelhead WAN Optimization device & Riverbed Steelhead MobileController for WAN Data
Optimization.
• Installation,configuration and troubleshootingof Cisco Call Manager,Gateway, Unity, Presence, IP phones.
28th march 2010 to September 2012 with TATA CONSULTANCY SERVICES as Network
Engineer.
Key Result Areas:
Involved in major activities during various project implementations and change controls.
Analyzing network traffic, monitoring and managing the health and status of the network using
Solar Winds, Info Vista, Net flow Analyzer and LMS.
Maintaining Cisco Routers 7200,3800 ,3600, 2800 series
Maintaining Catalyst 6500, 4500, 4006, 3500 Series switches.
Co-coordinating with CITI Global Network Team( Singapore,U.S.A,) for Global Support
Coordinating with service providers for commissioning and maintaining the WAN links.
3. Sustaining proper documentation of the network setup and change control.
Managing IP address and VLANs.
Supporting Network Operations by 24/7
Configuring standby protocols
Monitoring CISCO devices through LMS.
Mac Binding.
Checking the status of BGP.
Handling different client ODC.
Participated in GET VPN implementation.
------------------------------------------------------------------------------------------------------------------------------------------
9th march 2009 to February 2010 CMS INFOSYSTEM as Network support Engineer.
Key Result Areas:
• Monitoring& ManagingL2 Switches.
• ManagingVLAN and configureport security on Cisco switches.
• Creatinguser accountand setting policiesin activedirectory.
• Network monitor usingSolarwind SNMP tool.
TRAININGS ATTENDED
• Fortigate end to end security
• Cyberoam unified threat Management
EDUCATION
-------------------------------------------------------------------------------------------------------------------------------
Passed B.TECH in information technology Engineering.
Certifications:
Certified C.C.N.A. professional
CCNP Routing
PERSONAL DETAILS
Date of Birth: 21/07/1981
Languages Known: English, Hindi,and Kannada
Address: Udupi-Karnataka-INDIA
PassportNo: M8633284
DECLARATION
I hereby declare that all the above information given by me is correct to the best of my knowledge
Date:
Place:
(Chandra Hebbar)