Préparation aux certifications sécurité Ethical Hacking (CEH) et Pentesting (GPEN)

Size: px
Start display at page:

Download "Préparation aux certifications sécurité Ethical Hacking (CEH) et Pentesting (GPEN)"

Transcription

1 Préparation aux certifications sécurité Ethical Hacking (CEH) et Pentesting (GPEN) Durée: 5.00 Jours Réf de cours: GKCEH Résumé: L objectif de la formation CEH «Ethical Hacking» est d aider l'entreprise à mettre en place les mesures préventives contre les attaques cybernétiques en testant son propre système d information d une manière contrôlée. Plus la technologie avance et la relation entreprise-technologie se fortifie, plus le besoin en ressources informatiques devient primordial pour la survie de l entreprise. C est la raison pour laquelle si une entreprise veut s assurer de protéger ses biens informationnels d une manière adéquate, elle doit tester son réseau et analyser sa posture de sécurité vis-à-vis des vulnérabilités et des menaces qui pèsent sur son système d information. Notre programme «Ethical Hacking» prépare les professionnels de la sécurité IT à passer plusieurs certifications internationales telles que CPTS, CEH et GPEN grâce à une approche indépendante des constructeurs. Cette formation est donc axée sur les techniques de piratage informatique. Elle plonge le participant dans un environnement interactif dans lequel il découvrira comment scanner, tester et pirater son propre système. L environnement intensif donnera à chaque participant des connaissances pointues et une expérience pratique des principaux systèmes de sécurité actuels. La formation se termine par un examen blanc CEH et des révisions par rapport aux questions posées. Public visé: Cette formation s adresse aux administrateurs de réseaux, consultants, conseillers en gouvernance, gestionnaires, responsable de la protection des actifs informationnels et tout autre professionnel dont le développement de carrière nécessite une certification en piratage informatique. Objectifs: Acquérir les connaissances nécessaires pour assurer l intégrité globale de l infrastructure IT. Maîtriser et identifier les vulnérabilités et les faiblesses au niveau des systèmes cibles en vue de simuler des attaques cybernétiques à blanc, en utilisant les mêmes outils et techniques que les pirates informatiques utilisent, en vue de corriger les failles exploitées au niveau des systèmes vulnérables à ces attaques. Apprendre comment les intrus acquièrent des privilèges et quelles actions peuvent être mises en œuvre pour sécuriser un système. Savoir détecter les intrusions, mettre en place une politique de sécurité, comprendront, entre autres, ce qu est l ingénierie sociale, la gestion des incidents et aussi l interprétation des logs. Comprendre comment fonctionne la défense périmétrique avant de scanner et d attaquer leurs propres réseaux. Pré-requis: Il est recommandé d avoir une expérience en administration de systèmes, une bonne compréhension des systèmes d exploitation (Unix, Linux ou Windows) et d avoir des notions des concepts de base de la sécurité de l information. Test et certification La formation permet de préparer notamment au passage de l'examen de certification Prometric CEH (Certified Ethical Hacker), seule certification reconnue à l échelle mondiale pour faire valoir vos compétences d auditeur technique en sécurité informatique.

2 Contenu: Introduction au «Ethical Hacking» Les Renifleurs réseaux Hacking de réseaux sans fil line line line Internet Crime Current Report: IC3 Lawful Intercept Wireless Networks Data Breach Investigations Report Wiretapping Wi-Fi Usage Statistics in the US Types of Data Stolen From the Sniffing Threats Wi-Fi Hotspots at Public Places Organizations How a Sniffer Works? Wi-Fi Networks at Home Essential Terminologies Hacker Attacking a Switch Types of Wireless Networks Elements of Information Security Types of Sniffing: Passive Sniffing Wireless Standards Authenticity and Non-Repudiation Types of Sniffing: Active Sniffing Service Set Identifier (SSID) The Security, Functionality, and Usability Protocols Vulnerable to Sniffing Wi-Fi Authentication Modes Triangle Tie to Data Link Layer in OSI Model Wireless Terminologies Security Challenges Hardware Protocol Analyzers Wi-Fi Chalking Effects of Hacking SPAN Port Wi-Fi Hotspot Finder: jiwire.com Who is a Hacker? MAC Flooding Wi-Fi Hotspot Finder: WeFi.com Hacker Classes How DHCP Works? Types of Wireless Antenna Hacktivism What is Address Resolution Protocol Parabolic Grid Antenna What Does a Hacker Do? (ARP)? Types of Wireless Encryption Phase 1 - Reconnaissance Configuring DHCP Snooping and WEP Encryption Phase 2 - Scanning Dynamic ARP Inspection on Cisco What is WPA? Phase 3 Gaining Access Switches Temporal Keys Phase 4 Maintaining Access MAC Spoofing/Duplicating What is WPA2? Phase 5 Covering Tracks DNS Poisoning Techniques WEP vs. WPA vs. WPA2 Types of Attacks on a System Sniffing Tool: Wireshark WEP Issues Why Ethical Hacking is Necessary? Sniffing Tool: CACE Pilot Weak Initialization Vectors (IV) Defense in Depth Sniffing Tool: Tcpdump/Windump How to Break WEP Encryption? Scope and Limitations of Ethical Hacking Discovery Tool: NetworkView How to Break WPA/WPA2 Encryption? What Do Ethical Hackers Do? Discovery Tool: The Dude Sniffer How to Defend Against WPA Cracking? Skills of an Ethical Hacker Password Sniffing Tool: Ace Wireless Threats: Access Control Attacks Vulnerability Research Packet Sniffing Tool: Capsa Network Wireless Threats: Integrity Attacks Vulnerability Research Websites Analyzer Wireless Threats: Confidentiality Attacks What is Penetration Testing? OmniPeek Network Analyzer Wireless Threats: Availability Attacks Why Penetration Testing? Network Packet Analyzer: Observer Wireless Threats: Authentication Attacks V Penetration Testing Methodology Session Capture Sniffer: NetWitness Rogue Access Point Attack Message Sniffer: Big-Mother Client Mis-association Footprinting et Reconnaissance TCP/IP Packet Crafter: Packet Builder Misconfigured Access Point Attack line Additional Sniffing Tools Unauthorized Association Footprinting Terminologies How an Attacker Hacks the Network Ad Hoc Connection Attack What is Footprinting? Using Sniffers? HoneySpot Access Point Attack Objectives of Footprinting How to Defend Against Sniffing? AP MAC Spoofing Footprinting Threats Sniffing Prevention Techniques Denial-of-Service Attack Locate Internal URLs How to Detect Sniffing? Jamming Signal Attack Public and Restricted Websites Promiscuous Detection Tool: PromqryUI Wi-Fi Jamming Devices Search for Company s Information Promiscuous Detection Tool: PromiS Wireless Hacking Methodology Footprinting Through Search Engines Find Wi-Fi Networks to Attack Collect Location Information Ingénierie sociale Attackers Scanning for Wi-Fi Networks People Search line Footprint the Wireless Network Gather Information from Financial Services What is Social Engineering? Wi-Fi Discovery Tool: inssider Footprinting Through Job Sites Behaviors Vulnerable to Attacks Wi-Fi Discovery Tool: NetSurveyor Monitoring Target Using Alerts Why is Social Engineering Effective? Wi-Fi Discovery Tool: NetStumbler Competitive Intelligence Gathering Warning Signs of an Attack Wi-Fi Discovery Tool: Vistumbler WHOIS Lookup Phases in a Social Engineering Attack Wi-Fi Discovery Tool: WirelessMon Extracting DNS Information Impact on the Organization Wi-Fi Discovery Tools Locate the Network Range Command Injection Attacks GPS Mapping Traceroute Common Targets of Social Engineering How to Discover Wi-Fi Network Using Mirroring Entire Website Types of Social Engineering Wardriving? Extract Website Information from Insider Attack Wireless Traffic Analysis Common Intrusion Tactics and Strategies Wireless Cards and Chipsets Monitoring Web Updates Using Website for Prevention Wi-Fi USB Dongle: AirPcap Watcher Risks of Social Networking to Corporate Wi-Fi Packet Sniffer: Wireshark with Tracking Communications Networks AirPcap Footprint Using Google Hacking Techniques Identity Theft Statistics 2010 Wi-Fi Packet Sniffer: Wi-Fi Pilot What a Hacker Can Do With Google Real Steven Gets Huge Credit Card Wi-Fi Packet Sniffer: OmniPeek Hacking? Statement Wi-Fi Packet Sniffer: CommView for Wi-Fi Google Advance Search Operators Identity Theft - Serious Problem What is Spectrum Analysis?

3 Google Hacking Tool: Google Hacking Social Engineering Countermeasures: Wireless Sniffers Database (GHDB) Policies Aircrack-ng Suite Google Hacking Tools Identity Theft Countermeasures How to Reveal Hidden SSIDs Additional Footprinting Tools Social Engineering Pen Testing Fragmentation Attack Footprinting Countermeasures How to Launch MAC Spoofing Attack? Footprinting PenTesting Attaques par Déni de Service Denial of Service: Deauthentication and line Disassociation Attacks Balayage réseaux What is a Denial of Service Attack? Man-in-the-Middle Attack line What is Distributed Denial of Service MITM Attack Using Aircrack-ng Network Scanning Attacks? Wireless ARP Poisoning Attack Types of Scanning Symptoms of a DoS Attack Rogue Access Point Checking for Live Systems - ICMP Scanning Cyber Criminals Evil Twin Ping Sweep Internet Chat Query (ICQ) How to Crack WEP Using Aircrack? Three-Way Handshake Internet Relay Chat (IRC) How to Crack WEP Using Aircrack? TCP Communication Flags DoS Attack Techniques Screenshot 1/2 Hping2 / Hping3 Botnet How to Crack WEP Using Aircrack? Hping Commands WikiLeak Operation Payback Screenshot 2/2 Scanning Techniques DoS Attack Tools How to Crack WPA-PSK Using Aircrack? Scanning: IDS Evasion Techniques Detection Techniques WPA Cracking Tool: KisMAC IP Fragmentation Tools DoS/DDoS Countermeasure Strategies WEP Cracking Using Cain ; Abel Scanning Tool: Nmap DDoS Attack Countermeasures WPA Brute Forcing Using Cain ; Abel Scanning Tool: NetScan Tools Pro Post-attack Forensics WPA Cracking Tool: Elcomsoft Wireless Scanning Tools Techniques to Defend against Botnets Security Auditor Do Not Scan These IP Addresses (Unless DoS/DDoS Countermeasures WEP/WPA Cracking Tools you want to get into trouble) DoS/DDoS Protection at ISP Level Wi-Fi Sniffer: Kismet Scanning Countermeasures Enabling TCP Intercept on Cisco IOS Wardriving Tools War Dialing Software RF Monitoring Tools Why War Dialing? Advanced DDoS Protection: IntelliGuard Wi-Fi Connection Manager Tools War Dialing Tools DDoS Protection System (DPS) Wi-Fi Traffic Analyzer Tools War Dialing Countermeasures DoS/DDoS Protection Tool Wi-Fi Raw Packet Capturing Tools OS Fingerprinting Denial of Service (DoS) Attack Wi-Fi Spectrum Analyzing Tools Banner Grabbing Tool: ID Serve Penetration Testing Bluetooth Hacking GET REQUESTS How to BlueJack a Victim? Banner Grabbing Tool: Netcraft Détournement de sessions Bluetooth Hacking Tool: Super Bluetooth Banner Grabbing Tools line Hack Banner Grabbing Countermeasures: What is Session Hijacking? Bluetooth Hacking Tool: PhoneSnoop Disabling or Changing Banner Dangers Posed by Hijacking Bluetooth Hacking Tool: BlueScanner Hiding File Extensions Why Session Hijacking is Successful? How to Defend Against Bluetooth Hiding File Extensions from Webpages Key Session Hijacking Techniques Hacking? Vulnerability Scanning Brute Forcing How to Detect and Block Rogue AP? Network Vulnerability Scanners HTTP Referrer Attack Wireless Security Layers LANsurveyor Spoofing vs. Hijacking How to Defend Against Wireless Attacks? Network Mappers Session Hijacking Process Wireless Intrusion Prevention Systems Proxy Servers Packet Analysis of a Local Session Wireless IPS Deployment Why Attackers Use Proxy Servers? Hijack Wi-Fi Security Auditing Tool: AirMagnet Use of Proxies for Attack Types of Session Hijacking WiFi Analyzer How Does MultiProxy Work? Predictable Session Token Wi-Fi Security Auditing Tool: AirDefense Free Proxy Servers Man-in-the-Middle Attack Wi-Fi Security Auditing Tool: Adaptive Proxy Workbench Man-in-the-Browser Attack Wireless IPS Proxifier Tool: Create Chain of Proxy Client-side Attacks Wi-Fi Security Auditing Tool: Aruba Servers Cross-site Script Attack RFProtect WIPS SocksChain Session Fixation Wi-Fi Intrusion Prevention System TOR (The Onion Routing) Network Level Session Hijacking Wi-Fi Predictive Planning Tools TOR Proxy Chaining Software The 3-Way Handshake Wi-Fi Vulnerability Scanning Tools HTTP Tunneling Techniques Sequence Numbers Wireless Penetration Testing Why do I Need HTTP Tunneling? TCP/IP Hijacking Super Network Tunnel Tool IP Spoofing: Source Routed Packets Evading IDS, Firewalls ; Détection de Httptunnel for Windows RST Hijacking Honey Pots Additional HTTP Tunneling Tools Blind Hijacking line SSH Tunneling Man-in-the-Middle Attack using Packet Intrusion Detection Systems (IDS) and its SSL Proxy Tool Sniffer Placement How to Run SSL Proxy? UDP Hijacking How IDS Works? Proxy Tools Session Hijacking Tools Ways to Detect an Intrusion Anonymizers Countermeasures Types of Intrusion Detection Systems Types of Anonymizers Protecting against Session Hijacking System Integrity Verifiers (SIV) Case: Bloggers Write Text Backwards to Methods to Prevent Session Hijacking: General Indications of Intrusions

4 Bypass Web Filters in China To be Followed by Web Developers General Indications of System Intrusions Text Conversion to Avoid Filters Methods to Prevent Session Hijacking: Firewall Censorship Circumvention Tool: Psiphon To be Followed by Web Users DeMilitarized Zone (DMZ) How Psiphon Works? Defending against Session Hijack Types of Firewall How to Check if Your Website is Blocked in Attacks Firewall Identification China or Not? Session Hijacking Remediation Honeypot G-Zapper IPSec How to Set Up a Honeypot? Anonymizer Tools Session Hijacking Pen Testing Intrusion Detection Tool Spoofing IP Address Intrusion Detection Systems: Tipping Point IP Spoofing Detection Techniques: Direct Hacking de serveurs Web Firewall: Sunbelt Personal Firewall TTL Probes line Honeypot Tools IP Spoofing Detection Techniques: IP Webserver Market Shares Insertion Attack Identification Number Open Source Webserver Architecture Evasion IP Spoofing Detection Techniques: TCP IIS Webserver Architecture Denial-of-Service Attack (DoS) Flow Control Method Website Defacement Obfuscating IP Spoofing Countermeasures Case Study False Positive Generation Scanning Pen Testing Why Web Servers are Compromised? Session Splicing Impact of Webserver Attacks Unicode Evasion Technique Enumération Webserver Misconfiguration Fragmentation Attack line Directory Traversal Attacks Overlapping Fragments What is Enumeration? HTTP Response Splitting Attack Time-To-Live Attacks Techniques for Enumeration Web Cache Poisoning Attack Invalid RST Packets Netbios Enumeration HTTP Response Hijacking Urgency Flag Enumerating User Accounts SSH Bruteforce Attack Polymorphic Shellcode Enumerate Systems Using Default Man-in-the-Middle Attack ASCII Shellcode Passwords Webserver Password Cracking Application-Layer Attacks SNMP (Simple Network Management Web Application Attacks Desynchronization Protocol) Enumeration Webserver Attack Methodology Pre Connection SYN UNIX/Linux Enumeration Webserver Attack Tools Post Connection SYN LDAP Enumeration Web Password Cracking Tool Other Types of Evasion NTP Enumeration Countermeasures Bypass Blocked Sites Using IP Address in SMTP Enumeration How to Defend Against Web Server Place of URL DNS Zone Transfer Enumeration Using Attacks? Bypass a Firewall using Proxy Server nslookup How to Defend against HTTP Response Detecting Honeypots Enumeration Countermeasures Splitting and Web Cache Poisoning? Honeypot Detecting Tool: Send-Safe Enumeration Pen Testing Patches and Hotfixes Honeypot Hunter What is Patch Management? Firewall Evasion Tools Hacking de système Identifying Appropriate Sources for Packet Fragment Generators line Updates and Patches Countermeasures Information at Hand Before System Hacking Installation of a Patch Firewall/IDS Penetration Testing Stage Patch Management Tool: Microsoft System Hacking: Goals Baseline Security Analyzer (MBSA) Débordement de tampons Password Cracking Web Application Security Scanner: line Microsoft Authentication Sandcat Buffer Overflows How Hash Passwords are Stored in Web Server Security Scanner: Wikto Why are Programs And Applications Windows SAM? Webserver Malware Infection Monitoring Vulnerable? What is LAN Manager Hash? Tool: HackAlert Understanding Stacks Kerberos Authentication Webserver Security Tools Stack-Based Buffer Overflow Salting Web Server Penetration Testing Understanding Heap PWdump7 and Fgdump Stack Operations L0phtCrack Hacking d applications Web Knowledge Required to Program Buffer Ophcrack line Overflow Exploits Cain ; Abel Web Application Security Statistics Buffer Overflow Steps RainbowCrack Introduction to Web Applications Simple Uncontrolled Overflow Password Cracking Tools Web Application Components Simple Buffer Overflow in C LM Hash Backward Compatibility How Web Applications Work? Code Analysis How to Defend against Password Cracking? Web Application Architecture Exploiting Semantic Comments in C Privilege Escalation Web 2.0 Applications (Annotations) Active@ Password Changer Vulnerability Stack How to Mutate a Buffer Overflow Exploit? Privilege Escalation Tools Web Attack Vectors Identifying Buffer Overflows How to Defend against Privilege Escalation? Web Application Threats How to Detect Buffer Overflows in a Executing Applications Unvalidated Input Program? Alchemy Remote Executor Parameter/Form Tampering BOU (Buffer Overflow Utility) RemoteExec Directory Traversal Testing for Heap Overflow Conditions: Execute This! Security Misconfiguration heap.exe Keylogger Injection Flaws Steps for Testing for Stack Overflow in

5 Types of Keystroke Loggers What is LDAP Injection? OllyDbg Debugger Acoustic/CAM Keylogger How LDAP Injection Works? Testing for Format String Conditions using Keyloggers Hidden Field Manipulation Attack IDA Pro Spyware Cross-Site Scripting (XSS) Attacks BoF Detection Tools How to Defend against Keyloggers? Web Application Denial-of-Service (DoS) Defense Against Buffer Overflows How to Defend against Spyware? Attack Data Execution Prevention (DEP) Rootkits Buffer Overflow Attacks Enhanced Mitigation Experience Toolkit Types of Rootkits Cookie/Session Poisoning (EMET) How Rootkit Works? Session Fixation Attack /GS Rootkit: Fu Insufficient Transport Layer Protection BoF Security Tools Detecting Rootkits Improper Error Handling Buffer Overflow Penetration Testing How to Defend against Rootkits? Insecure Cryptographic Storage Anti-Rootkit: RootkitRevealer and McAfee Broken Authentication and Session Cryptographie Rootkit Detective Management line NTFS Data Stream Unvalidated Redirects and Forwards Cryptography What is Steganography? Web Services Architecture Types of Cryptography Types of Steganography Footprint Web Infrastructure Government Access to Keys (GAK) Steganalysis Web Spidering Using Burp Suite Ciphers Steganography Detection Tool: Stegdetect Hacking Web Servers Advanced Encryption Standard (AES) Why Cover Tracks? Analyze Web Applications Data Encryption Standard (DES) Ways to Clear Online Tracks Attack Authentication Mechanism RC4, RC5, RC6 Algorithms Disabling Auditing: Auditpol Username Enumeration The DSA and Related Signature Schemes Covering Tracks Tool: Window Washer Password Attacks: Password RSA (Rivest Shamir Adleman) Covering Tracks Tool: Tracks Eraser Pro Functionality Exploits Message Digest (One-way Bash) System Hacking Penetration Testing Password Attacks: Password Guessing Functions Password Attacks: Brute-forcing Secure Hashing Algorithm (SHA) Chevaux de Troie ; Portes dérobées Session Attacks: Session ID Prediction/ What is SSH (Secure Shell)? line Brute-forcing MD5 Hash Calculators: HashCalc, MD5 What is a Trojan? Cookie Exploitation: Cookie Poisoning Calculator and HashMyFiles Overt and Covert Channels Authorization Attack Cryptography Tool: Advanced Encryption Purpose of Trojans Session Management Attack Package What Do Trojan Creators Look For? Injection Attacks Cryptography Tools Indications of a Trojan Attack Attack Data Connectivity Public Key Infrastructure (PKI) Common Ports used by Trojans Attack Web App Client Certification Authorities How to Infect Systems Using a Trojan? Attack Web Services Digital Signature Wrappers Web Services Probing Attacks SSL (Secure Sockets Layer) Different Ways a Trojan can Get into a Web Service Attack Tool: soapui Transport Layer Security (TLS) System Web Service Attack Tool: XMLSpy Disk Encryption How to Deploy a Trojan? Web Application Hacking Tool: Burp Cryptography Attacks Evading Anti-Virus Techniques Suite Professional Code Breaking Methodologies Types of Trojans Web Application Hacking Tools: Meet-in-the-Middle Attack on Digital Destructive Trojans CookieDigger Signature Schemes Notification Trojans Web Application Hacking Tools: Cryptanalysis Tool: CrypTool Credit Card Trojans WebScarab Cryptanalysis Tools Data Hiding Trojans (Encrypted Trojans) Encoding Schemes Online MD5 Decryption Tool BlackBerry Trojan: PhoneSnoop Web Application Firewall: dotdefender MAC OS X Trojan: DNSChanger Web Application Firewall: IBM AppScan Tests d intrusion Mac OS X Trojan: Hell Raiser Web Application Firewall: line How to Detect Trojans? ServerDefender VP Introduction to Penetration Testing Process Monitoring Tool: What's Running Web Application Pen Testing Security Assessments Scanning for Suspicious Registry Entries Vulnerability Assessment Registry Entry Monitoring Tools Injection SQL Penetration Testing Scanning for Suspicious Device Drivers line Why Penetration Testing? Scanning for Suspicious Windows Services SQL Injection is the Most Prevalent What Should be Tested? Scanning for Suspicious Startup Programs Vulnerability in 2010 What Makes a Good Penetration Test? Scanning for Suspicious Files and Folders SQL Injection Threats ROI on Penetration Testing Scanning for Suspicious Network Activities What is SQL Injection? Testing Points Trojan Countermeasures SQL Injection Attacks Testing Locations Backdoor Countermeasures How Web Applications Work? Types of Penetration Testing Trojan Horse Construction Kit Server Side Technologies Common Penetration Testing Techniques Anti-Trojan Software: TrojanHunter HTTP Post Request Using DNS Domain Name and IP Address Anti-Trojan Software: Emsisoft Anti-Malware SQL Injection Detection Information Anti-Trojan Softwares SQL Injection Black Box Pen Testing Enumerating Information about Hosts on Pen Testing for Trojans and Backdoors Types of SQL Injection Publicly-Available Networks What is Blind SQL Injection? Phases of Penetration Testing Virus ; Vers SQL Injection Methodology Penetration Testing Methodology

6 line Information Gathering Outsourcing Penetration Testing Services Introduction to Viruses Database, Table, and Column Evaluating Different Types of Pentest Virus and Worm Statistics 2010 Enumeration Tools Stages of Virus Life Features of Different DBMSs Application Security Assessment Tool Working of Viruses: Infection Phase Password Grabbing Network Security Assessment Tool Working of Viruses: Attack Phase Transfer Database to Attacker s Machine Wireless/Remote Access Assessment Why Do People Create Computer Viruses? Interacting with the Operating System Tool Indications of Virus Attack Interacting with the FileSystem Telephony Security Assessment Tool How does a Computer get Infected by Network Reconnaissance Full Query Testing Network-Filtering Device Tool Viruses? SQL Injection Tools Virus Hoaxes Evading IDS Virus Analysis How to Defend Against SQL Injection Types of Viruses Attacks? Transient and Terminate and Stay Resident SQL Injection Detection Tools Viruses Snort Rule to Detect SQL Injection Writing a Simple Virus Program Attacks Computer Worms How is a Worm Different from a Virus? Example of Worm Infection: Conficker Worm Worm Analysis: Worm Maker: Internet Worm Maker Thing What is Sheep Dip Computer? Anti-Virus Sensors Systems Malware Analysis Procedure String Extracting Tool: Bintext Compression and Decompression Tool: UPX Process Monitoring Tools: Process Monitor Log Packet Content Monitoring Tools: NetResident Debugging Tool: Ollydbg Virus Analysis Tool: IDA Pro Online Malware Testing Online Malware Analysis Services Virus Detection Methods Virus and Worms Countermeasures Companion Antivirus: Immunet Protect Anti-virus Tools Penetration Testing for Virus Autre(s) Information(s): Support de cours incluant 14 Go de labs et d'outils afin de s'entrainer. Plus d'informations: Pour plus de renseignements ou pour vous inscrire, merci de nous contacter au [email protected] 100, avenue Albert 1er RUEIL-MALMAISON

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning Course Outline: Certified Ethical Hacker v8 Learning Method: Instructor-led Classroom Learning Duration: 5.00 Day(s)/ 35 hrs Overview: This class will immerse the students into an interactive environment

More information

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison

Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation

More information

CEH Version8 Course Outline

CEH Version8 Course Outline CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information

More information

CYBERTRON NETWORK SOLUTIONS

CYBERTRON NETWORK SOLUTIONS CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified

More information

[CEH]: Ethical Hacking and Countermeasures

[CEH]: Ethical Hacking and Countermeasures [CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,

More information

INFORMATION SECURITY TRAINING

INFORMATION SECURITY TRAINING INFORMATION SECURITY TRAINING Course Duration: 45 days Pre-Requisite: Basic Knowledge of Internet Course Content Course Fee: 15,000 ( Online Examination Fee, Books, Certification, Tools & Software's Included

More information

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification

More information

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9] CH EHC EC-Council Ethical Hacking and [v.9] Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Intermediate Ethical Hacking Core Delivery

More information

EC Council Certified Ethical Hacker V8

EC Council Certified Ethical Hacker V8 Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they

More information

Corso: Certified Ethical Hacker Codice PCSNET: SIIN-1 Cod. Vendor: CEH Durata: 5

Corso: Certified Ethical Hacker Codice PCSNET: SIIN-1 Cod. Vendor: CEH Durata: 5 Corso: Certified Ethical Hacker Codice PCSNET: SIIN-1 Cod. Vendor: CEH Durata: 5 Obiettivi La classe immergerà i partecipanti in un ambiente fortemente interattivo nel quale verrà loro mostrato come effettuare

More information

Ethical Hacking v7 40 H.

Ethical Hacking v7 40 H. ΦΑΛΗΡΟΥ 93, ΚΟΥΚΑΚΙ, 11741 Τ. 210-9230099, Φ. 210-9229280 www.ictc.gr [email protected] TITLE DURATION Ethical Hacking v7 40 H. Overview This class will immerse the student into an interactive environment where

More information

Detailed Description about course module wise:

Detailed Description about course module wise: Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference

More information

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses

More information

SONDRA SCHNEIDER JOHN NUNES

SONDRA SCHNEIDER JOHN NUNES TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME

More information

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting

https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting https://elearn.zdresearch.com https://training.zdresearch.com/course/pentesting Chapter 1 1. Introducing Penetration Testing 1.1 What is penetration testing 1.2 Different types of test 1.2.1 External Tests

More information

Ethical Hacking Course Layout

Ethical Hacking Course Layout Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type

More information

Build Your Own Security Lab

Build Your Own Security Lab Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers

More information

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Professional Penetration Testing Techniques and Vulnerability Assessment ... Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment

More information

Description: Objective: Attending students will learn:

Description: Objective: Attending students will learn: Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of

More information

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology

More information

Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH) Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The

More information

Certified Ethical Hacker. Course Content

Certified Ethical Hacker. Course Content Certified Ethical Hacker Course Content ription Module 01: Introduction to Ethical Hacking Internet Crime Current Report: IC3 Data Breach Investigations Report Types of Data Stolen From the Organizations

More information

CH EHC Ethical Hacking and Countermeasures Detailed Course Outline

CH EHC Ethical Hacking and Countermeasures Detailed Course Outline CH EHC Ethical Hacking and Countermeasures Detailed Course Outline Summary Duration Vendor Audience 5 Days hands-on training EC-Council Security Professionals Level Technology Category Intermediate Ethical

More information

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill

More information

Certified Ethical Hacking. CEH v8 Course. Ημέρα & Ημερομηνία Διεξαγωγής. 02/11/2015-03/11-04/11 05/11-06/11-09/11 6 Συναντήσεις 9:00-17:00

Certified Ethical Hacking. CEH v8 Course. Ημέρα & Ημερομηνία Διεξαγωγής. 02/11/2015-03/11-04/11 05/11-06/11-09/11 6 Συναντήσεις 9:00-17:00 Certified Ethical Hacking Ημέρα & Ημερομηνία Διεξαγωγής 02/11/2015-03/11-04/11 05/11-06/11-09/11 6 Συναντήσεις 9:00-17:00 Tόπος Διεξαγωγής: City Unity College Λεωφόρος Αγλαντζιάς 79, 2ος όροφος, 2107 Αγλαντζιά

More information

Certified Ethical Hacker V7 (CEH)

Certified Ethical Hacker V7 (CEH) Certified Ethical Hacker V7 (CEH) Course Description: This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE COURSE OVERVIEW This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each

More information

CRYPTUS DIPLOMA IN IT SECURITY

CRYPTUS DIPLOMA IN IT SECURITY CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information

More information

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --

More information

Students must have at least 2 years experience in being a Network Administrator before attempting this course.

Students must have at least 2 years experience in being a Network Administrator before attempting this course. EC-Council CEH v.7 Course Number: 312-50 Course Overview This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

Ethical Hacking CEHv7 Course Outline

Ethical Hacking CEHv7 Course Outline Ethical Hacking CEHv7 Course Outline Course Description This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.

More information

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.

More information

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will

More information

EC-Council CEH v.7. Course Introduction

EC-Council CEH v.7. Course Introduction EC-Council CEH v.7 Course Introduction Course Introduction Module 00 - Student Introduction Student Introduction Course Materials CEHv7 Course Outline EC-Council Certification Program Certified Ethical

More information

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

If you know the enemy and know yourself, you need not fear the result of a hundred battles. Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you

More information

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks

More information

Vulnerability Assessment and Penetration Testing

Vulnerability Assessment and Penetration Testing Vulnerability Assessment and Penetration Testing Module 1: Vulnerability Assessment & Penetration Testing: Introduction 1.1 Brief Introduction of Linux 1.2 About Vulnerability Assessment and Penetration

More information

FSP-201: Ethical Hacking & IT Security

FSP-201: Ethical Hacking & IT Security FSP-201: Ethical Hacking & IT Security Session 2015-16 OVERVIEW ABOUT SIFS INDIA COURSE INTRODUCTION ENTRY REQUIREMENTS HOW TO APPLY FEE STRUCTURE COURSE MODULES CAREER PROSPECTS LIBRARY TRAINING & INTERNSHIP

More information

Malicious Network Traffic Analysis

Malicious Network Traffic Analysis Malicious Network Traffic Analysis Uncover system intrusions by identifying malicious network activity. There are a tremendous amount of network based attacks to be aware of on the internet today and the

More information

Topics in Network Security

Topics in Network Security Topics in Network Security Jem Berkes MASc. ECE, University of Waterloo B.Sc. ECE, University of Manitoba www.berkes.ca February, 2009 Ver. 2 In this presentation Wi-Fi security (802.11) Protecting insecure

More information

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important Presented By: Holes in the Fence Dave Engebretson, Contributing Technology writer, SDM Magazine Industry Instructor in Fiber and Networking Prevention of Security System breaches of networked Edge Devices

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months MODULE: INTRODUCTION TO INFORMATION SECURITY INFORMATION SECURITY ESSENTIAL TERMINOLOGIES SECURITY

More information

ETHICAL HACKING. By REAL TIME FACULTY

ETHICAL HACKING. By REAL TIME FACULTY w w ẉ s u n m ar s ṣ n et ETHICAL HACKING Duration : 1 Month Timings : 4.30 p.m. to 6.00 p.m. By REAL TIME FACULTY # 407, 4 th Floor, New HUDA MYTHRI VIHAR, Beside Aditya Trade Centre, Ameerpet, Hyd. -

More information

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)

More information

Network Attacks and Defenses

Network Attacks and Defenses Network Attacks and Defenses Tuesday, November 25, 2008 Sources: Skoudis, CounterHack; S&M Chapter 5 (including many images) CS342 Computer Security Department of Computer Science Wellesley College Networks

More information

Certified Penetration Testing Specialist

Certified Penetration Testing Specialist Certified Penetration Testing Specialist Course Length: 5 days Course Code: CPTS Course Description CPTS is built upon proven hands-on Penetration Testing methodologies as utilized by our international

More information

Web App Security Audit Services

Web App Security Audit Services locuz.com Professional Services Web App Security Audit Services The unsecured world today Today, over 80% of attacks against a company s network come at the Application Layer not the Network or System

More information

642 552 Securing Cisco Network Devices (SND)

642 552 Securing Cisco Network Devices (SND) 642 552 Securing Cisco Network Devices (SND) Course Number: 642 552 Length: 1 Day(s) Course Overview This course is part of the training for the Cisco Certified Security Professional, Cisco Firewall Specialist,

More information

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10)

APNIC elearning: Network Security Fundamentals. 20 March 2013 10:30 pm Brisbane Time (GMT+10) APNIC elearning: Network Security Fundamentals 20 March 2013 10:30 pm Brisbane Time (GMT+10) Introduction Presenter/s Nurul Islam Roman Senior Training Specialist [email protected] Specialties: Routing &

More information

CS5008: Internet Computing

CS5008: Internet Computing CS5008: Internet Computing Lecture 22: Internet Security A. O Riordan, 2009, latest revision 2015 Internet Security When a computer connects to the Internet and begins communicating with others, it is

More information

Penetration Testing with Kali Linux

Penetration Testing with Kali Linux Penetration Testing with Kali Linux PWK Copyright 2014 Offensive Security Ltd. All rights reserved. Page 1 of 11 All rights reserved to Offensive Security, 2014 No part of this publication, in whole or

More information

Understanding Security Testing

Understanding Security Testing Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many

More information

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam

JK0 015 CompTIA E2C Security+ (2008 Edition) Exam JK0 015 CompTIA E2C Security+ (2008 Edition) Exam Version 4.1 QUESTION NO: 1 Which of the following devices would be used to gain access to a secure network without affecting network connectivity? A. Router

More information

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability WWW Based upon HTTP and HTML Runs in TCP s application layer Runs on top of the Internet Used to exchange

More information

Information Security. Training

Information Security. Training Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin

More information

Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)

Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute

More information

Learn Ethical Hacking, Become a Pentester

Learn Ethical Hacking, Become a Pentester Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,

More information

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs

NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary

More information

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd.

WLAN Attacks. Wireless LAN Attacks and Protection Tools. (Section 3 contd.) Traffic Analysis. Passive Attacks. War Driving. War Driving contd. Wireless LAN Attacks and Protection Tools (Section 3 contd.) WLAN Attacks Passive Attack unauthorised party gains access to a network and does not modify any resources on the network Active Attack unauthorised

More information

Network Security Fundamentals

Network Security Fundamentals APNIC elearning: Network Security Fundamentals 27 November 2013 04:30 pm Brisbane Time (GMT+10) Introduction Presenter Sheryl Hermoso Training Officer [email protected] Specialties: Network Security IPv6

More information

Linux Network Security

Linux Network Security Linux Network Security Course ID SEC220 Course Description This extremely popular class focuses on network security, and makes an excellent companion class to the GL550: Host Security course. Protocols

More information

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN) MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file

More information

Certified Security Analyst

Certified Security Analyst Certified Security Analyst Course ID ECC200 Course Description The EC Council Certified Security Analyst (ECSA) program is a comprehensive, standards-based, methodology intensive training program which

More information

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)

More information

EC-Council. Certified Ethical Hacker. Program Brochure

EC-Council. Certified Ethical Hacker. Program Brochure EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional

More information

CERTIFIED PENETRATION TESTING CONSULTANT

CERTIFIED PENETRATION TESTING CONSULTANT Cyber Security Training & Consulting CERTIFIED PENETRATION TESTING CONSULTANT COURSE OVERVIEW 4 Days 32 CPE Credits $3,500 The Certified Penetration Testing Consultant course is our advanced course in

More information

Audience. Pre-Requisites

Audience. Pre-Requisites T R A N C H U L A S W O R K S H O P S A N D T R A I N I N G S Hands-On Penetration Testing Training Course About Tranchulas Tranchulas is a multinational information security company having its offices

More information

Networking: EC Council Network Security Administrator NSA

Networking: EC Council Network Security Administrator NSA coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA

More information

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow

IDS 4.0 Roadshow. Module 1- IDS Technology Overview. 2003, Cisco Systems, Inc. All rights reserved. IDS Roadshow IDS 4.0 Roadshow Module 1- IDS Technology Overview Agenda Network Security Network Security Policy Management Protocols The Security Wheel IDS Terminology IDS Technology HIDS and NIDS IDS Communication

More information

Certified Cyber Security Expert V 2.0 + Web Application Development

Certified Cyber Security Expert V 2.0 + Web Application Development Summer Training Program Certified Cyber Security Expert V + Web Application Development A] Training Sessions Schedule: Modules Ethical Hacking & Information Security Particulars Duration (hours) Ethical

More information

McAfee Certified Assessment Specialist Network

McAfee Certified Assessment Specialist Network McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample

More information

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006

WIRELESS SECURITY. Information Security in Systems & Networks Public Development Program. Sanjay Goel University at Albany, SUNY Fall 2006 WIRELESS SECURITY Information Security in Systems & Networks Public Development Program Sanjay Goel University at Albany, SUNY Fall 2006 1 Wireless LAN Security Learning Objectives Students should be able

More information

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0

EUCIP - IT Administrator. Module 5 IT Security. Version 2.0 EUCIP - IT Administrator Module 5 IT Security Version 2.0 Module 5 Goals Module 5 Module 5, IT Security, requires the candidate to be familiar with the various ways of protecting data both in a single

More information

RMAR Technologies Pvt. Ltd.

RMAR Technologies Pvt. Ltd. Course Name : StartXHack V2.0 Ethical Hacking & Cyber Security Course Duration : 2 Days (8Hrs./day) Course Fee : INR 1000/participant Course Module : 1. Introduction to Ethical Hacking a. What is Ethical

More information

Demystifying Penetration Testing

Demystifying Penetration Testing Demystifying Penetration Testing Prepared by Debasis Mohanty www.hackingspirits.com E-Mail: [email protected] Goals Of This Presentation An overview of how Vulnerability Assessment (VA) & Penetration

More information

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions

Security Awareness For Server Administrators. State of Illinois Central Management Services Security and Compliance Solutions Security Awareness For Server Administrators State of Illinois Central Management Services Security and Compliance Solutions Purpose and Scope To present a best practice approach to securing your servers

More information

CompTIA Security+ (Exam SY0-410)

CompTIA Security+ (Exam SY0-410) CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate

More information

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

ITEC441- IS Security. Chapter 15 Performing a Penetration Test 1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and

More information

Introduction. Course Description

Introduction. Course Description Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 Introduction Insecure wireless networks at

More information

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning

More information

Network Attacks. Common Network Attacks and Exploits

Network Attacks. Common Network Attacks and Exploits Common and Exploits AGENDA A Few Observations Hacker Resources Attack Categories Some Common Attacks Wireless Specific Attacks Wireless Observations Because of Common Network Layers, Most of the Attacks

More information

FORBIDDEN - Ethical Hacking Workshop Duration

FORBIDDEN - Ethical Hacking Workshop Duration Workshop Course Module FORBIDDEN - Ethical Hacking Workshop Duration Lecture and Demonstration : 15 Hours Security Challenge : 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once

More information

(WAPT) Web Application Penetration Testing

(WAPT) Web Application Penetration Testing (WAPT) Web Application Penetration Testing Module 0: Introduction 1. Introduction to the course. 2. How to get most out of the course 3. Resources you will need for the course 4. What is WAPT? Module 1:

More information

General Network Security

General Network Security 4 CHAPTER FOUR General Network Security Objectives This chapter covers the following Cisco-specific objectives for the Identify security threats to a network and describe general methods to mitigate those

More information

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST.

EC-Council CAST CENTER FOR ADVANCED SECURITY TRAINING. CAST 619 Advanced SQLi Attacks and Countermeasures. Make The Difference CAST. CENTER FOR ADVANCED SECURITY TRAINING 619 Advanced SQLi Attacks and Countermeasures Make The Difference About Center of Advanced Security Training () The rapidly evolving information security landscape

More information

Chapter 15: Computer and Network Security

Chapter 15: Computer and Network Security Chapter 15: Computer and Network Security Complete CompTIA A+ Guide to PCs, 6e What is in a security policy Mobile device security methods and devices To perform operating system and data protection How

More information

Session Hijacking Exploiting TCP, UDP and HTTP Sessions

Session Hijacking Exploiting TCP, UDP and HTTP Sessions Session Hijacking Exploiting TCP, UDP and HTTP Sessions Shray Kapoor [email protected] Preface With the emerging fields in e-commerce, financial and identity information are at a higher risk of being

More information

Loophole+ with Ethical Hacking and Penetration Testing

Loophole+ with Ethical Hacking and Penetration Testing Loophole+ with Ethical Hacking and Penetration Testing Duration Lecture and Demonstration: 15 Hours Security Challenge: 01 Hours Introduction Security can't be guaranteed. As Clint Eastwood once said,

More information

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security? 7 Network Security 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework 7.4 Firewalls 7.5 Absolute Security? 7.1 Introduction Security of Communications data transport e.g. risk

More information

A Systems Engineering Approach to Developing Cyber Security Professionals

A Systems Engineering Approach to Developing Cyber Security Professionals A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.

More information

Where every interaction matters.

Where every interaction matters. Where every interaction matters. Peer 1 Vigilant Web Application Firewall Powered by Alert Logic The Open Web Application Security Project (OWASP) Top Ten Web Security Risks and Countermeasures White Paper

More information

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE

CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE CYBER ATTACKS EXPLAINED: THE MAN IN THE MIDDLE Due to the encouraging feedback this series of articles has received, we decided to explore yet another type of cyber intrusionthe Man In The Middle (MITM)

More information

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module

CS 665: Computer System Security. Network Security. Usage environment. Sources of vulnerabilities. Information Assurance Module CS 665: Computer System Security Network Security Bojan Cukic Lane Department of Computer Science and Electrical Engineering West Virginia University 1 Usage environment Anonymity Automation, minimal human

More information

Ethical Hacking and Countermeasures

Ethical Hacking and Countermeasures Ethical Hacking and Countermeasures (Version 8) Module 01: Introduction to Ethical Hacking Information Security Overview o Internet Crime Current Report: IC3 o Data Breach Investigations Report o Essential

More information

How To Classify A Dnet Attack

How To Classify A Dnet Attack Analysis of Computer Network Attacks Nenad Stojanovski 1, Marjan Gusev 2 1 Bul. AVNOJ 88-1/6, 1000 Skopje, Macedonia [email protected] 2 Faculty of Natural Sciences and Mathematics, Ss. Cyril

More information