logo


your one source for IT & AV

Training Presentation Systems Services & Consulting Cloud Services Purchase Client Center Computer Museum
Arrow Course Schedule | Classroom Rentals | Student Information | Free Seminars | Client Feedback | Partners | Survey | Standby Discounts

Cyber Security: Threat Analysis and Response Solution

SS Course: 2001237

Course Overview

TOP

This training experience will cover the following topics in depth, threat identification, insider threat prevention, detection and mitigation, assessment of security assurance, information terrorism, information security management standards, public policy drivers, the role of information security professionals and much more. This course takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field. 

                                                                  

Scheduled Classes

TOP

What You'll Learn

TOP

At the conclusion of this course, students will be able to do the following:

  • Explain the history and current state of hacking and penetration testing
  • Describe cryptology
  • Identify common information gathering tools and techniques
  • Analyze system vulnerabilities exploited by hackers
  • Perform web and database attacks
  • Remove trojans, backdoors, and malware from infected systems
  • Perform network traffic analysis and sniffing by using appropriate tools
  • Analyze wireless network vulnerabilities exploited by hackers
  • Perform incident handling by using appropriate methods
  • Compare and contrast defensive technologies

Outline

TOP
Viewing outline for:
  • Hacking: The Next Generation
  • TCP/IP Review
  • Cryptographic Concepts
  • Footprinting the Environment
  • Scanning the Environment and Network
  • System Enumeration and System Hacking
  • Wireless Vulnerabilities
  • Web Applications and Cloud Technologies
  • Malware
  • Sniffers, Session Hijacking, and Denial of Service
  • Backtrack R3
  • Social Engineering
  • Incident Response 
  • Defensive Technologies

Labs

  • Assessing and Securing Systems on a Wide Area Network (WAN)
  • Applying Encryption and Hashing Algorithms for Secure Communications
  • Data Gathering and Footprinting on a Targeted Website
  • Using Ethical Hacking Techniques to Exploite a Vulnerable Workstation
  • Attacking a Vulnerable Web Applicaation and Database
  • Identifying and Removing Malware on a Windows System
  • Analyzing Network Traffice to Create a Baseline Definition
  • Auditing a Wireless Network and Planning for a Secure WLAN Implementation
  • Investigating and Responding to Security Incidents
  • Securing the Network with an Intrusion Detection System (IDS)

Prerequisites

TOP

Before attending this course, students should have knowledge of:

  • Threat Identification
  • Detection and Mitigation
  • Security Assurance
  • Network Security Protocol

    Who Should Attend

    TOP

    This course is intended for:

    • Network Administrator
    • System Administrator
    • IT Security Specialist
    • Ethical Hacker
    • Penetration Tester

    Next Step Courses

    TOP