Course Overview
TOPThis training experience will cover the following topics in depth, threat identification, insider threat prevention, detection and mitigation, assessment of security assurance, information terrorism, information security management standards, public policy drivers, the role of information security professionals and much more. This course takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field.
Scheduled Classes
TOPWhat You'll Learn
TOPAt the conclusion of this course, students will be able to do the following:
- Explain the history and current state of hacking and penetration testing
- Describe cryptology
- Identify common information gathering tools and techniques
- Analyze system vulnerabilities exploited by hackers
- Perform web and database attacks
- Remove trojans, backdoors, and malware from infected systems
- Perform network traffic analysis and sniffing by using appropriate tools
- Analyze wireless network vulnerabilities exploited by hackers
- Perform incident handling by using appropriate methods
- Compare and contrast defensive technologies
Outline
TOP
Viewing outline for:
- Hacking: The Next Generation
- TCP/IP Review
- Cryptographic Concepts
- Footprinting the Environment
- Scanning the Environment and Network
- System Enumeration and System Hacking
- Wireless Vulnerabilities
- Web Applications and Cloud Technologies
- Malware
- Sniffers, Session Hijacking, and Denial of Service
- Backtrack R3
- Social Engineering
- Incident Response
- Defensive Technologies
Labs
- Assessing and Securing Systems on a Wide Area Network (WAN)
- Applying Encryption and Hashing Algorithms for Secure Communications
- Data Gathering and Footprinting on a Targeted Website
- Using Ethical Hacking Techniques to Exploite a Vulnerable Workstation
- Attacking a Vulnerable Web Applicaation and Database
- Identifying and Removing Malware on a Windows System
- Analyzing Network Traffice to Create a Baseline Definition
- Auditing a Wireless Network and Planning for a Secure WLAN Implementation
- Investigating and Responding to Security Incidents
- Securing the Network with an Intrusion Detection System (IDS)
Prerequisites
TOPBefore attending this course, students should have knowledge of:
- Threat Identification
- Detection and Mitigation
- Security Assurance
- Network Security Protocol
Who Should Attend
TOPThis course is intended for:
- Network Administrator
- System Administrator
- IT Security Specialist
- Ethical Hacker
- Penetration Tester