Workshops & Trainings

Upcoming Workshop / Event Detials
mission

Workshop Details


Workshop Name:
Comprehensive Course on Linux OS & Security: Week 3 : Secure Communication & Data Protection on CentOS
Core Concepts, Advanced Security, Troubleshooting & Real-World Implementation

Organized By:
National Centre for Cyber Security - Air University, Islamabad

Date:
16th May- 18th May, 2025

Duration:
3 Days (20 Hours - Friday, Saturday, Sunday)

Mode of Training:
On-site

Targeted Audience:
Open For All

Payment Category:
Paid

For Professional:
PKR 25,000

For Students:
PKR 6,000 (Air University), PKR 8,000 (Other than AU)

Entertainment:
Lunch with two tea breaks (Saturday & Sunday)

Technical Content to be Covered:


Fundamentals of Secure Communication

  • Introduction to Network Security & Threats
    • Common cyber threats & attack vectors
    • Best practices for secure communication

CentOS Hardening Basics

  • Securing SSH (Disable root login, Use key-based authentication)
  • Configuring firewalld & SELinux

Packet Filtering & Access Control

  • Configuring iptables and firewalld
  • Port Knocking with knockd to protect remote access

Secure Remote Access with VPN & SSH

  • Virtual Private Network (VPN) Setup
    • OpenVPN & IPSec implementation on CentOS
    • Site-to-Site and Remote Access VPNs
  • SSH Security & Tunneling
    • SSH Port Forwarding & Reverse Tunneling
    • Securing SSH with Fail2Ban & Port Knocking
  • Multi-Factor Authentication for SSH
    • Google Authenticator & hardware keys

Secure Data Transfer & Encryption

  • File Transfer Security
    • SFTP vs SCP vs Rsync over SSH
    • GPG Encryption for File Transfer

Secure Video Conferencing & Real-World Scenarios

  • Self-Hosted Video Conferencing Solutions
    • Jitsi Meet setup on CentOS
    • Configuring TURN/STUN servers for NAT traversal
  • Hardened VoIP & WebRTC Security
    • SIP over TLS & SRTP encryption
  • Practical Hands-on Scenarios
    • Simulated Cyber Attacks & Defense Techniques
    • Securing Multi-Site Communication

Key Takeaways:

  • ✔️ Configure secure VPNs for remote access
  • ✔️ Protect SSH & remote access with advanced techniques
  • ✔️ Implement port knocking & MFA for additional security
  • ✔️ Secure data transfer
  • ✔️ Deploy self-hosted video conferencing securely
  • ✔️ Monitor & respond to security threats

Registration

Registration:
"Register Yourself"