ETHICAL HACKING

Ethical Hacking and Countermeasures Course Outline

divider

 

 Course Description

This class will immerse the students into an interactive environment

where they will be shown how to scan, test, hack and secure their own systems.

The lab intensive environment gives each student in-depth knowledge

and practical experience with the current essential security systems.

Students will begin by understanding how perimeter defenses work

and then be lead into scanning and attacking their own networks, no real network is harmed.

Students then learn how intruders escalate privileges

and what steps can be taken to secure a system.

Students will also learn about Intrusion Detection,

Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

When a student leaves this intensive 5 day class they will have hands on understanding

and experience in Ethical Hacking.

This course prepares you for EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

Introduction to Ethical Hacking

  • Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
  • Information Security Overview
    • Case Study
      • eBay Data Breach
      • Google Play Hack
      • The Home Depot Data Breach
    • Year of the Mega Breach
    • Data Breach Statistics
    • Malware Trends in 2014
    • Essential Terminology
    • Elements of Information Security
    • The Security, Functionality, and Usability Triangle
  • Information Security Threats and Attack Vectors
    • Motives, Goals, and Objectives of Information Security Attacks
    • Top Information Security Attack Vectors
    • Information Security Threat Categories
    • Types of Attacks on a System
      • Operating System Attacks
        • Examples of OS Vulnerabilities
      • Misconfiguration Attacks
      • Application-Level Attacks
        • Examples of Application-Level Attacks
      • Shrink Wrap Code Attacks
    • Information Warfare
  • Hacking Concepts, Types, and Phases
    • What is Hacking
    • Who is a Hacker?
    • Hacker Classes
    • Hacking Phases
      • Reconnaissance
      • Scanning
      • Gaining Access
      • Maintaining Access
      • Clearing Tracks
  • Ethical Hacking Concepts and Scope
    • What is Ethical Hacking?
    • Why Ethical Hacking is Necessary
    • Scope and Limitations of Ethical Hacking
    • Skills of an Ethical Hacker
  • Information Security Controls
    • Information Assurance (IA)
    • Information Security Management Program
    • Threat Modeling
    • Enterprise Information Security Architecture (EISA)
    • Network Security Zoning
    • Defense in Depth
    • Information Security Policies
      • Types of Security Policies
      • Examples of Security Policies
      • Privacy Policies at Workplace
      • Steps to Create and Implement Security Policies
      • HR/Legal Implications of Security Policy Enforcement
    • Physical Security
      • Physical Security Controls
    • Incident Management
      • Incident Management Process
      • Responsibilities of an Incident Response Team
    • What is Vulnerability Assessment?
      • Types of Vulnerability Assessment
      • Network Vulnerability Assessment Methodology
      • Vulnerability Research
      • Vulnerability Research Websites
    • Penetration Testing
      • Why Penetration Testing
      • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
      • Blue Teaming/Red Teaming
      • Types of Penetration Testing
      • Phases of Penetration Testing
      • Security Testing Methodology
      • Penetration Testing Methodology
  • Information Security Laws and Standards
    • Payment Card Industry Data Security Standard (PCI-DSS)
    • ISO/IEC 27001:2013
    • Health Insurance Portability and Accountability Act (HIPAA)
    • Sarbanes Oxley Act (SOX)
    • The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
    • Cyber Law in Different Countries

 

Leave a Reply

Your email address will not be published. Required fields are marked *