Ethical Hacking Concepts

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems.

Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Course Outline

M0 - Course Introduction
M1 - Business and Technical Logistics of Pen Testing
M2 - Information Gathering
M3 - Linux Fundamentals
M4 - Detecting Live Systems
M5 - Reconnaissance
M6 - Cryptography
M7 - Vulnerability Assessments
M8 – Windows Hacking
M9 - Advanced Vulnerability & Exploitation Techniques
M10 - Malware - Software Goes Undercover
M11 - Attacking Wireless Networks
M12 - Networks -Sniffing - IDS
M13 - Attacking Databases
M14 - Attacking Web Technologies

Audience

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Certifications and Exams:

ECC-312-50-ANSI

RCEHC