Course Description
This course provides a comprehensive overview of hacking and cyber security defense and response tools and techniques. It incorporates several hands-on exercises utilizing the same attack methods used by hackers and cyber security professionals. The course starts with a discussion of why people hack and how they hack. It then focuses on the methods used, including the initial foot printing of the target, scanning the network and finally enumerating target host machines. The second day focuses on the measures necessary to protect your network from the threat. Topics include understanding your network traffic, firewalls, host hardening, intrusion detection systems and network design. Tools used for this class include: Nessus, Nmap, SuperScan, Snort, Fport, John the Ripper, and many others.
Course Outline
- Hackers
- Why do they hack?
- Casing the Establishment
- Footprinting Target Acquisition
- Scanning
- Enumerating
- Hands-On Lab
- System Hacking
- Hacking Windows XP
- Hacking Windows 2000/2003
- Hacking Unix/Linux
- Novell NetWare Hacking
- Network Hacking
- Dial-Up and VPN Hacking
- Network Devices
- Firewalls
- Denial of Service (DoS)
- Software Hacking
- Remote Control Insecurities
- Advanced Techniques
- Web Hacking
- Hacking the Internet User
- Protecting Your Network
- Know Thy Self
- Monitor Network Usage
- Perform Vulnerability Analysis
- Perform Penetration Tests
- Know Thy Self
- Defense in Depth
- Firewalls
- Host Hardening
- Intrusion Detection/Prevention
- Secure Design Elements
Prerequisites
- SEC200 Security Architecture and Controls,
- TCP/IP Fundamentals or equivalent
Duration
12 Hours | 2 Days or 4 Nights
Applies Towards the Following Certificates
- Cyber Security Certificate - 60 Hour : 60 Hour Certificate
- Cyber Security Certificate - 90 Hour : Required
*Academic Unit eligibility to be determined by college/university in which you are enrolled in a degree seeking program.