National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
|
|
|
- Camron Lane
- 10 years ago
- Views:
Transcription
1 National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8) exam, or courses that include similar knowledge and skills. A primary goal of the NCL is to seamlessly integrate hands- on lab exercises and challenging cybersecurity games into higher education curriculum. The NCL uses a game analogy to describe our events because we believe that we are providing a fun environment that allow students (AKA players) to test their knowledge and skills against other players - just like a game! This NCL Syllabus is not intended as a replacement to an existing course, but can provide supplemental hands- on lab exercises aligned with the NCL games. We encourage college faculty (AKA coaches) to look at ways to include this syllabus as part of the lab component of their course(s). While CompTIA Security+ and EC- Council Certified Ethical Hacker (CEH) performance- based exam objectives are the foci of the 2014 NCL Fall Season, faculty and students in related security courses can also benefit from adding hands- on labs and NCL games as part of their course assignments. As educators, we understand the importance of aligning exercises to an academic calendar (e.g., semesters). We welcome feedback to help us to best support faculty and their instructional goals. Network Development Group (NDG) collaborated with the Center for Systems Security and Information Assurance (CSSIA), a co- founding member of the NCL, to create a series of lab exercises intended to support the CEH curriculum. As an NDG partner, the NCL is able to take full advantage of this collaboration and offer these excellent hands- on labs to all NCL players and coaches. 1
2 We suggest that faculty use the lab assignments in this syllabus as ungraded homework for students, and the NCL games as graded assignments. Through the NCL, college faculty will be able to infuse virtual cyber lab exercises into their courses and be better prepared to coach competitive cyber teams. Please contact Casey W. O Brien, NCL Commissioner ([email protected]) if you have any questions about using the labs and games in your fall courses Fall Season The 2014 NCL Fall Season will be will partially based on the CEH performance- based exam objectives, a widely recognized and adopted curriculum and certification - the 2014 NCL Fall Season also includes objectives for the Security+. Akin to conditioning in athletics, or practicing layups and free throws in the gym, the NCL will host 19 virtual preparatory CEH lab exercises in Cyber Gymnasiums across the country, which students can use to develop and practice hands- on skills for the NCL games and the CEH certification exam. Players will be participating in a type of computer security game called a Capture- the- Flag (CTF). In CTF games, players race to answer security- related challenges, often searching for digital flags" hidden on servers, in encrypted text, or in applications. Challenges within the CTF are open- ended and require expertise and skills in a wide range of security- related topics: computer forensics, cryptography, network penetration testing, web security, and system/network administration. When a player submits a flag, they receive points for solving the challenge. The player or team with the highest cumulative score at the end of the game wins. 2
3 The NCL will also host a Regular Season, comprised of a mandatory Pre- Season assessment (September 27- October 4), two Regular Season games, optimized for individuals (October 18 and November 1), and a Post Season game for teams the NCL National Championship (November 15-22). These games will be created and optimized for individuals and teams and are designed to provide hands- on experiences and challenges to help students to develop and improve cybersecurity skills and problem- solving abilities. All games will be conducted remotely, in a virtual Cyber Stadium (powered by isight Partner s ThreatSpace), equally accessible to all. Who Can Participate? Individuals currently enrolled as a student at an U.S. accredited 2- or 4- year college/university All teams must have a faculty/mentor coach Registration fee is $20 per individual participant and $25 per participating team Players are expected to commit to the entire season There are no prerequisite skills for participation, but successful Bronze- level players will have completed the preparatory exercises; Silver- and Gold- level players a cross- section of intermediate knowledge and skills in computer science, networking, systems administration, and information security NCL Recommended Books The syllabus topics provided below are based on the following textbooks: Official Certified Ethical Hacker Review Guide Author: Steven DeFino ISBN- 10: ISBN- 13:
4 Hands- On Ethical Hacking and Network Defense, Second Edition Author: Michael T. Simpson ISBN- 10: Ethical Hacking & Countermeasures: Attack Phases Author: EC- Council ISBN- 10: X ISBN- 13: Ethical Hacking and Countermeasures: Linux, Macintosh & Mobile Systems ISBN- 10: ISBN- 13: Ethical Hacking & Countermeasures: Secure Network Infrastructures Author: EC- Council ISBN- 10: ISBN- 13: Ethical Hacking & Countermeasures: Threats & Defense Mechanisms Author: EC- Council ISBN- 10: ISBN- 13: Ethical Hacking & Countermeasures: Web Applications & Data Servers Author: EC- Council ISBN- 10: ISBN- 13:
5 NCL Syllabus Topics Background knowledge needed for CEH v8 Analysis and Assessment Security Tools/Systems/Programs Procedures/Methodology Regulation/Policy Ethics The table below lists sections and content of the CEH exam and the approximate extent to which they are represented in the exam: (from EC- Council information/ceh- exam ): CEH Section % of Exam # of Questions Background 4% 5 Analysis/Assessment 13% 16 Security 25% 31 Tools/Systems/Programs 32% 40 Procedures/Methodology 20% 25 Regulation/Policy 4% 5 Ethics 2% 3 5
6 The above- mentioned 7 sections include the following CEH exam content knowledge: Background Networking technologies Web technologies (e.g. web 2.0, Skype) Systems technologies Communication protocols Malware operations Mobile technologies (e.g. smart phones) Telecommunication technologies Backups and archiving (e.g. local, network) Analysis/Assessment Data analysis Systems analysis Risk assessments Technical assessment methods Security Systems security controls Application / file server Firewalls Cryptography Network security Physical security Threat modeling Verification procedures (e.g. false positive / negative validation Social engineering (human factors manipulation) Vulnerability scanners Security policy implications Privacy / confidentiality (with regard to engagement) 6
7 Biometrics Wireless access technology (e.g. networking, RFID, Bluetooth) Trusted networks Vulnerabilities Tools/Systems/Programs Network- / host- based intrusion Network / wireless sniffers (e.g. Wireshark, Airsnort) Access control mechanisms (e.g. smartcards) Cryptography techniques (e.g. IPsec, SSL,PGP) Programming languages (e.g. C++, Java, C#, C) Scripting languages (e.g. PHP, Java script) Boundary protection appliances (e.g. DMZ) Network topologies Subnetting Port Scanning (e.g. NMAP) Domain name system (DNS) Routers / modems / switches Vulnerability scanner (e.g. Nessus, Retina) Vulnerability management and protection systems (e.g. Foundstone, Ecora) Operating environments (e.g. Linux, Windows, Mac) Antivirus systems and programs Log analysis tools Security models Exploitation tools Database structures Procedures/Methodology Cryptography Public Key Infrastructure (PKI) Security Architecture (SA) 7
8 Service Oriented Architecture (SOA) Information security incident management N- Tier application design TCP/IP networking (e.g. network routing) Security testing methodology Regulation/Policy Security policies Compliance regulations (e.g. PCI) Ethics Professional code of conduct Appropriateness of hacking activities Lab Exercises There are 19 remote lab exercises, available in the NCL Cyber Gym, designed to: Reinforce the concepts covered in the CEH content knowledge with hands- on activities Help prepare students for the NCL games Help students prepare for the CEH certification exam Provide supplemental lab exercises for faculty teaching CEH and related course(s) and content The following lab exercises can be completed anytime, anyplace, via the virtual NCL Cyber Gym. Instructions for accessing these lab exercises will be made available separately: Lab 1: Using Active and Passive Techniques to Enumerate Network Hosts Introduction to Ethical Hacking Scanning Networks Enumeration Sniffers 8
9 Lab 2: Conducting Active and Passive Reconnaissance Against a Target Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Social Engineering Lab 3: Using the SYSTEM account Lab 4: Poison Ivy Remote Access Trojan Trojans and Backdoors Viruses and Worms Lab 5: Using the SHARK Remote Administration Tool Trojans and Backdoors Viruses and Worms Lab 6: Utilizing Malware - Dark Comet Trojans and Backdoors Viruses and Worms Lab 7: Breaking Windows Passwords Lab 8: Using John the Ripper to Crack Linux Passwords Lab 9: Using Spear Phishing to Target an Organization Social Engineering 9
10 Session Hijacking Lab 10: Breaking WEP and WPA Encryption Hacking Wireless Networks Lab 11: Using Metasploit to Attack a Remote System Scanning Networks Enumeration Sniffers Evading IDS, Firewalls, and Honeypots Lab 12: Using Armitage to Attack the Network Introduction to Ethical Hacking Footprinting and Reconnaissance Scanning Networks Penetration Testing Lab 13: Exploitation with IPv6 Lab 14: Creating MSFPAYLOADS Trojans and Backdoors Viruses and Worms Penetration Testing Lab 15: Abusing SYSTEMS Denial of Service Lab 16: SQL Injection Hacking Webservers Hacking Web Applications SQL Injection 10
11 Lab 17: Launching a Buffer Overflow Buffer Overflow Lab 18: Intrusion Detection Evading IDS, Firewalls, and Honeypots Lab 19: Using Certificates to Encrypt Cryptography Lab Topology for Virtual Lab Exercises (available in the NCL Cyber Gym) 11
12 (From Learning Objectives Upon successfully completing the course, students will be able to: Utilize various information security tools given different target systems in different environments Discuss how the tools interrelate with each other in an overall penetration testing process 12
13 Implement countermeasures for various types of attacks Apply a common ethical hacking methodology to carry out a penetration test Analyze how penetration testing and ethical hacking fit into a comprehensive enterprise information security program Demonstrate ethical behavior appropriate to security- related technologies Suggested Schedule The following suggested schedule maps the Official Certified Ethical Hacker Review Guide chapters with the corresponding NCL lab exercise(s) and NCL games. The Preseason Game will be held on 9/27-10/4. This game is mandatory for all players and requires no prerequisite knowledge. Faculty are encouraged to supplement with the more comprehensive information in the five CEH textbooks: Suggested Schedule (game dates subject to change) Chapter 1: Ethical Hacking Basics Chapter 3: Reconnaissance Information Gathering for the Ethical Hacker Lab 2: Conducting Active and Passive Reconnaissance Against a Target - - Introduction to Ethical Hacking, Footprinting and Reconnaissance, Scanning Networks, Social Engineering Lab 12: Using Armitage to Attack the Network - - Introduction to Ethical Hacking, Footprinting and Reconnaissance, Scanning Networks, System Hacking, Penetration Testing Chapter 4: Scanning and Enumeration Lab 1: Using Active and Passive Techniques to Enumerate Network Hosts - Introduction to Ethical Hacking, Scanning Networks, Enumeration, Sniffers Lab 11: Using Metasploit to Attack a Remote System - Scanning Networks, 13
14 Enumeration, Sniffers, Evading IDS, Firewalls, and Honeypots Chapter 5: Hacking Through the Network Sniffers and Evasion Chapter 6: Attacking a System Lab 3: Using the SYSTEM account - - System Hacking Lab 18: Intrusion Detection - - Evading IDS, Firewalls, and Honeypots Chapter 8: Web- Based Hacking Servers and Applications Lab 13: Exploitation with IPv6 - - System Hacking Lab 15: Abusing SYSTEMS - - Denial of Service Lab 16: SQL Injection - - Hacking Webservers, Hacking Web Applications, SQL Injection Lab 17: Launching a Buffer Overflow- - System Hacking, Buffer Overflow 10/18/14 Regular Season: Game #1 (Prerequisite: Mandatory Pre- Season 09/27-10/4) Chapter 2: Cryptography 101 Lab 7: Breaking Windows Passwords - - System Hacking Lab 8: Using John the Ripper to Crack Linux Passwords - - System Hacking Lab 19: Using Certificates to Encrypt - - Cryptography Chapter 9: Wireless Networking Hacking Lab 10: Breaking WEP and WPA Encryption - - Hacking Wireless Networks 11/01/14 Regular Season: Game #2 (Prerequisite: Mandatory Pre- Season and Regular Season Game #1) - Chapter 10: Trojans and Other Attacks Lab 4: Poison Ivy (Remote Access Trojan) - - System Hacking, Trojans and Backdoors, Viruses and Worms Lab 5: Using the SHARK Remote Administration Tool - - System Hacking, Trojans and Backdoors, Viruses and Worms Lab 6: Utilizing Malware (Dark Comet) - - System Hacking, Trojans and 14
15 Backdoors, Viruses and Worms Lab 14: Creating MSFPAYLOADS - - System Hacking, Trojans and Backdoors, Viruses and Worms, Penetration Testing - Chapter 7: Low Tech: Social Engineering and Physical Security Lab 9: Using Spear Phishing to Target an Organization - - System Hacking, Social Engineering, Session Hijacking 11/15-11/22 Post Season: NCL Championship (Prerequisite: Mandatory Preseason and Regular Season Games #1 & #2) 15
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus
National Cyber League Certified Ethical Hacker (CEH) TM Syllabus Note to Faculty This NCL Syllabus is intended as a supplement to courses that are based on the EC- Council Certified Ethical Hacker TM (CEHv8)
When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.
Ethical Hacking and Countermeasures Course Description: This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems.
[CEH]: Ethical Hacking and Countermeasures
[CEH]: Ethical Hacking and Countermeasures Length Audience(s) Delivery Method : 5 days : This course will significantly benefit security officers, auditors, security professionals, site administrators,
CEH Version8 Course Outline
CEH Version8 Course Outline Module 01: Introduction to Ethical Hacking Information Security Overview Information Security Threats and Attack Vectors Hacking Concepts Hacking Phases Types of Attacks Information
EC Council Certified Ethical Hacker V8
Course Code: ECCEH8 Vendor: Cyber Course Overview Duration: 5 RRP: 2,445 EC Council Certified Ethical Hacker V8 Overview This class will immerse the delegates into an interactive environment where they
Certified Ethical Hacker (CEH)
Certified Ethical Hacker (CEH) Course Number: CEH Length: 5 Day(s) Certification Exam This course will help you prepare for the following exams: Exam 312 50: Certified Ethical Hacker Course Overview The
Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)
Page 1 of 6 Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits) TNCC Cybersecurity Program web page: http://tncc.edu/programs/cyber-security Course Description: Encompasses
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM
COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM Course Description This is the Information Security Training program. The Training provides you Penetration Testing in the various field of cyber world.
CYBERTRON NETWORK SOLUTIONS
CYBERTRON NETWORK SOLUTIONS CybertTron Certified Ethical Hacker (CT-CEH) CT-CEH a Certification offered by CyberTron @Copyright 2015 CyberTron Network Solutions All Rights Reserved CyberTron Certified
Certified Ethical Hacker Exam 312-50 Version Comparison. Version Comparison
CEHv8 vs CEHv7 CEHv7 CEHv8 19 Modules 20 Modules 90 Labs 110 Labs 1700 Slides 1770 Slides Updated information as per the latest developments with a proper flow Classroom friendly with diagrammatic representation
CRYPTUS DIPLOMA IN IT SECURITY
CRYPTUS DIPLOMA IN IT SECURITY 6 MONTHS OF TRAINING ON ETHICAL HACKING & INFORMATION SECURITY COURSE NAME: CRYPTUS 6 MONTHS DIPLOMA IN IT SECURITY Course Description This is the Ethical hacking & Information
EC-Council. Certified Ethical Hacker. Program Brochure
EC-Council C Certified E Ethical Hacker Program Brochure Course Description The (CEH) program is the core of the most desired information security training system any information security professional
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)
Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE --
CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker
ALL ElNis ONE CEH Certified Ethical Hacker EXAM GUIDE Matt Walker Mc Grain/ New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto McGraw-Hill
Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed
Venue Nairobi Kenya (exact hotel name to be confirmed before course) Dates March 31, 2014 April 4, 2014 Inovatec College Certified Ethical Hacker (CEH) boot camp The Certified Ethical Hacker (CEH) Certification
Learning and Playing: Integrating Competition Experiences Into Formal Curriculum. 2014 3CS Palos Hills, IL
Learning and Playing: Integrating Competition Experiences Into Formal Curriculum 2014 3CS Palos Hills, IL Discussion What is the NCL? Partnerships Features Enrichment & Assessment Preparation for Certifications
EC-Council Certified Security Analyst (ECSA)
EC-Council Certified Security Analyst (ECSA) v8 Eğitim Tipi ve Süresi: 5 Days VILT 5 Day VILT EC-Council Certified Security Analyst (ECSA) v8 Learn penetration testing methodologies while preparing for
If you know the enemy and know yourself, you need not fear the result of a hundred battles.
Rui Pereira,B.Sc.(Hons),CIPS ISP/ITCP,CISSP,CISA,CWNA/CWSP,CPTE/CPTC Principal Consultant, WaveFront Consulting Group [email protected] 1 (604) 961-0701 If you know the enemy and know yourself, you
SONDRA SCHNEIDER JOHN NUNES
TECHNOLOGY TRANSFER PRESENTS SONDRA SCHNEIDER JOHN NUNES CERTIFIED ETHICAL HACKER TM THE ONLY WAY TO STOP A HACKER IS TO THINK LIKE ONE MAY 21-25, 2007 VISCONTI PALACE HOTEL - VIA FEDERICO CESI, 37 ROME
Detailed Description about course module wise:
Detailed Description about course module wise: Module 1: Basics of Networking and Major Protocols 1.1 Networks and its Types. 1.2 Network Topologies 1.3 Major Protocols and their Functions 1.4 OSI Reference
Professional Penetration Testing Techniques and Vulnerability Assessment ...
Course Introduction Today Hackers are everywhere, if your corporate system connects to internet that means your system might be facing with hacker. This five days course Professional Vulnerability Assessment
EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker
EC-Council Hacking Technology C Certified E Ethical Hacker Certified Ethical Hacker v8 Certified Ethical Hacker Course Description CEHv8 is a comprehensive Ethical Hacking and Information Systems Security
Build Your Own Security Lab
Build Your Own Security Lab A Field Guide for Network Testing Michael Gregg WILEY Wiley Publishing, Inc. Contents Acknowledgments Introduction XXI xxiii Chapter 1 Hardware and Gear Why Build a Lab? Hackers
A Systems Engineering Approach to Developing Cyber Security Professionals
A Systems Engineering Approach to Developing Cyber Security Professionals D r. J e r r y H i l l Approved for Public Release; Distribution Unlimited. 13-3793 2013 The MITRE Corporation. All rights reserved.
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led
Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led Course Description This class will immerse the student into an interactive environment where they will
CS 391-950 Ethical Hacking Spring 2016
CS 391-950 Ethical Hacking Spring 2016 Instructor: Shahriar Nick Rahimi Office: Faner 2136 Office Hours: MW 8:30 am-11 am Friday 10 am- 11 am E-Mail: [email protected] Course Web Site: https://online.siu.edu/
EC-Council. Program Brochure. EC-Council. Page 1
Program Brochure Page 1 Certified Ethical Hacker Version 7 Revolutionary Product releases the most advanced ethical hacking program in the world. This much anticipated version was designed by hackers and
Course Title: Course Description: Course Key Objective: Fee & Duration:
Course Title: Course Description: This is the Ethical hacking & Information Security Diploma program. This 6 months Diploma Program provides you Penetration Testing in the various field of cyber world.
2015 Webinar Series: NCL for the Classroom
2015 Webinar Series: NCL for the Classroom National CyberWatch Center Prince George s Community College Room 129B 301 Largo Road Largo, MD 20774 www.nationalcyberwatch.org Webinar Protocol :: Mute your
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)
Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro) NICE Conference 2014 CYBERSECURITY RESILIENCE A THREE TIERED SOLUTION NIST Framework for Improving Critical Infrastructure Cybersecurity
LINUX / INFORMATION SECURITY
LINUX / INFORMATION SECURITY CERTIFICATE IN LINUX SYSTEM ADMINISTRATION The Linux open source operating system offers a wide range of graphical and command line tools that can be used to implement a high-performance,
INFORMATION SECURITY TRAINING
INFORMATION SECURITY TRAINING Course Duration: 45 days Pre-Requisite: Basic Knowledge of Internet Course Content Course Fee: 15,000 ( Online Examination Fee, Books, Certification, Tools & Software's Included
Ethical Hacking Course Layout
Ethical Hacking Course Layout Introduction to Ethical Hacking o What is Information Security? o Problems faced by the Corporate World o Why Corporate needs Information Security? Who is a Hacker? o Type
FSP-201: Ethical Hacking & IT Security
FSP-201: Ethical Hacking & IT Security Session 2015-16 OVERVIEW ABOUT SIFS INDIA COURSE INTRODUCTION ENTRY REQUIREMENTS HOW TO APPLY FEE STRUCTURE COURSE MODULES CAREER PROSPECTS LIBRARY TRAINING & INTERNSHIP
Principles of Information Assurance Syllabus
Course Number: Pre-requisite: Career Cluster/Pathway: Career Major: Locations: Length: 8130 (OHLAP Approved) Fundamentals of Technology or equivalent industry certifications and/or work experience. Information
Virtual Learning Tools in Cyber Security Education
Virtual Learning Tools in Cyber Security Education Dr. Sherly Abraham Faculty Program Director IT and Cybersecurity Dr. Lifang Shih Associate Dean School of Business & Technology, Excelsior College Overview
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP
Security Certifications Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP Wie ben ik? Jordy Kersten 26 jaar Communicatie Systemen HAN Arhnem Informatiekunde RU Nijmegen Security Consultant
PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access
The Best First for Beginners who want to become Penetration Testers PTSv2 in pills: Self-paced, online, flexible access 900+ interactive slides and 3 hours of video material Interactive and guided learning
Networking: EC Council Network Security Administrator NSA
coursemonster.com/uk Networking: EC Council Network Security Administrator NSA View training dates» Overview The EC-Council's NSA certification looks at network security from a defensive view. The NSA
CIS 4204 Ethical Hacking Fall, 2014
CIS 4204 Ethical Hacking Fall, 2014 Course Abstract: The purpose of this course is to provide a basic understanding of computing, networking, programming concepts, and exploitation techniques, as they
CSSIA CompTIA Security+ Domain. Network Security. Network Security. Network Security. Network Security. Network Security
Security+ Supported Labs - V1 Lab 1 Network Devices and Technologies - Capturing Network Using tcpdump to Capture Network with Wireshark with Network Miner 2 Secure Network Administration Principles -
Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur
Demystifying Penetration Testing for the Enterprise Presented by Pravesh Gaonjur Pravesh Gaonjur Founder and Executive Director of TYLERS Information Security Consultant Certified Ethical Hacker (CEHv8Beta)
Network Attacks and Defenses
Network Attacks and Defenses Tuesday, November 25, 2008 Sources: Skoudis, CounterHack; S&M Chapter 5 (including many images) CS342 Computer Security Department of Computer Science Wellesley College Networks
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp
EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp ECSA/LPT is a security class like no other! Providing real world hands on experience, it is the only in-depth
Jort Kollerie SonicWALL
Jort Kollerie Cloud 85% of businesses said their organizations will use cloud tools moderately to extensively in the next 3 years. 68% of spend in private cloud solutions. - Bain and Dell 3 Confidential
Certified Cyber Security Expert V 2.0 + Web Application Development
Summer Training Program Certified Cyber Security Expert V + Web Application Development A] Training Sessions Schedule: Modules Ethical Hacking & Information Security Particulars Duration (hours) Ethical
RMAR Technologies Pvt. Ltd.
Course Name : StartXHack V2.0 Ethical Hacking & Cyber Security Course Duration : 2 Days (8Hrs./day) Course Fee : INR 1000/participant Course Module : 1. Introduction to Ethical Hacking a. What is Ethical
INFORMATION SECURITY TRAINING CATALOG (2015)
INFORMATICS AND INFORMATION SECURITY RESEARCH CENTER CYBER SECURITY INSTITUTE INFORMATION SECURITY TRAINING CATALOG (2015) Revision 3.0 2015 TÜBİTAK BİLGEM SGE Siber Güvenlik Enstitüsü P.K. 74, Gebze,
Penetration Testing. Presented by
Penetration Testing Presented by Roadmap Introduction to Pen Testing Types of Pen Testing Approach and Methodology Side Effects Demonstration Questions Introduction and Fundamentals Penetration Testing
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts)
Course Duration: 80Hrs. Course Fee: INR 7000 + 1999 (Certification Lab Exam Cost 2 Attempts) Course Module: 1. Introduction to Ethical Hacking 2. Footprinting a. SAM Spade b. Nslookup c. Nmap d. Traceroute
CompTIA Security+ Certification Study Guide. (Exam SYO-301) Glen E. Clarke. Gravu Hill
CompTIA Security+ Certification Study Guide (Exam SYO-301) Glen E. Clarke McGraw-Hill is an independent entity from CompTIA,This publication and CD may be used in assisting students to prepare for the
Hackers are here. Where are you?
1 2 What is EC-Council Certified Security Analyst Licensed Penetration Tester Program You are an ethical hacker. Your last name is Pwned. You dream about enumeration and you can scan networks in your sleep.
Security + Certification (ITSY 1076) Syllabus
Security + Certification (ITSY 1076) Syllabus Course: ITSY 1076 Security+ 40 hours Course Description: This course is targeted toward an Information Technology (IT) professional who has networking and
Understanding Security Testing
Understanding Security Testing Choosing between vulnerability assessments and penetration testing need not be confusing or onerous. Arian Eigen Heald, M.A., Ms.IA., CNE, CISA, CISSP I. Introduction Many
Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200
Information Technology Career Cluster Advanced Cybersecurity Course Number: 11.48200 Course Description: Advanced Cybersecurity is designed to provide students the advanced concepts and terminology of
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs
Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs Why Network Security? Keep the bad guys out. (1) Closed networks
ITEC441- IS Security. Chapter 15 Performing a Penetration Test
1 ITEC441- IS Security Chapter 15 Performing a Penetration Test The PenTest A penetration test (pentest) simulates methods that intruders use to gain unauthorized access to an organization s network and
Ethical Hacking & Cyber Security Workshop
Ethical Hacking & Cyber Security Workshop i3indya Technologies (A unit of ithree Infotech Pvt. Ltd.) Delhi Office: 37, First Floor, Defence Enclave, Preet Vihar, New Delhi-110092 Contact us: Email: [email protected]
CompTIA Security+ (Exam SY0-410)
CompTIA Security+ (Exam SY0-410) Length: Location: Language(s): Audience(s): Level: Vendor: Type: Delivery Method: 5 Days 182, Broadway, Newmarket, Auckland English, Entry Level IT Professionals Intermediate
Audience. Pre-Requisites
T R A N C H U L A S W O R K S H O P S A N D T R A I N I N G S Hands-On Penetration Testing Training Course About Tranchulas Tranchulas is a multinational information security company having its offices
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Program Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
Certified Cyber Security Analyst VS-1160
VS-1160 Certified Cyber Security Analyst Certification Code VS-1160 Vskills certification for Cyber Security Analyst assesses the candidate as per the company s need for cyber security and forensics. The
Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours
Ethical Hacking and Information Security Duration Detailed Module Foundation of Information Security Lecture with Hands On Session: 90 Hours Elements of Information Security Introduction As technology
Bellevue University Cybersecurity Programs & Courses
Undergraduate Course List Core Courses: CYBR 250 Introduction to Cyber Threats, Technologies and Security CIS 311 Network Security CIS 312 Securing Access Control CIS 411 Assessments and Audits CYBR 320
Analyze. Secure. Defend. Do you hold ECSA credential?
1 Analyze. Secure. Defend. Do you hold ECSA credential? TM E C S A EC-Council Certified Security Analyst 1 EC-Council Cyber Security Professional Path Threat Agent Application of Methodology So You Can
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100
Information Technology Career Cluster Introduction to Cybersecurity Course Number: 11.48100 Course Description: Introduction to Cybersecurity is designed to provide students the basic concepts and terminology
Cyber Exercises, Small and Large
First International Conference on Cyber Crisis Cooperation: Cyber Exercises 27 June 2012 Cyber Exercises, Small and Large Commander Mike Bilzor Computer Science Department U.S. Naval Academy Annpolis,
Description: Objective: Attending students will learn:
Course: Introduction to Cyber Security Duration: 5 Day Hands-On Lab & Lecture Course Price: $ 3,495.00 Description: In 2014 the world has continued to watch as breach after breach results in millions of
CyberNEXS Global Services
CyberNEXS Global Services CYBERSECURITY A cyber training, exercising, competition and certification product for maximizing the cyber skills of your workforce The Cyber Network EXercise System CyberNEXS
a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)
MIS5206 Week 12 Your Name Date 1. Which significant risk is introduced by running the file transfer protocol (FTP) service on a server in a demilitarized zone (DMZ)? a) User from within could send a file
McAfee Certified Assessment Specialist Network
McAfee Certified Assessment Specialist Network Exam preparation guide Table of Contents Introduction 3 Becoming McAfee Certified 3 Exam Details 4 Recommended Exam Preparation 4 Exam Objectives 4 Sample
Information Security. Training
Information Security Training Importance of Information Security Training There is only one way to keep your product plans safe and that is by having a trained, aware and a conscientious workforce. - Kevin
Ethical Hacking v7 40 H.
ΦΑΛΗΡΟΥ 93, ΚΟΥΚΑΚΙ, 11741 Τ. 210-9230099, Φ. 210-9229280 www.ictc.gr [email protected] TITLE DURATION Ethical Hacking v7 40 H. Overview This class will immerse the student into an interactive environment where
UVic Department of Electrical and Computer Engineering
UVic Department of Electrical and Computer Engineering COURSE OUTLINE Elec 567 Advanced Network Security and Forensics Spring 2014 Instructor: Office Hours: Dr. Issa Traore Days: Monday, Thursday Phone:
Penetration Testing Service. By Comsec Information Security Consulting
Penetration Testing Service By Consulting February, 2007 Background The number of hacking and intrusion incidents is increasing year by year as technology rolls out. Equally, there is no hiding place your
NSA/DHS CAE in IA/CD 2014 Mandatory Knowledge Unit Checklist 4 Year + Programs
Mandatory Knowledge Units 1.0 Core2Y 1.1 Basic Data Analysis The intent of this Knowledge Unit is to provide students with basic abilities to manipulate data into meaningful information. 1.1.1 Topics Summary
Course Content: Session 1. Ethics & Hacking
Course Content: Session 1 Ethics & Hacking Hacking history : How it all begin Why is security needed? What is ethical hacking? Ethical Hacker Vs Malicious hacker Types of Hackers Building an approach for
Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE
COURSE OVERVIEW This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each
Soran University Faculty of Science and Engineering Computer Science Department Information Security Module Specification
1. Module Title Information Security 2. Module Code: CS403INS 3. Module Level - Forth Stage 4. Module Leader Safwan M. 5. Teaching Semester 7 and 8 Soran University Faculty of Science and Engineering Computer
ETHICAL HACKING. By REAL TIME FACULTY
w w ẉ s u n m ar s ṣ n et ETHICAL HACKING Duration : 1 Month Timings : 4.30 p.m. to 6.00 p.m. By REAL TIME FACULTY # 407, 4 th Floor, New HUDA MYTHRI VIHAR, Beside Aditya Trade Centre, Ameerpet, Hyd. -
Track 2: Introductory Track PREREQUISITE: BASIC COMPUTER EXPERIENCE
Anne Arundel Community College Tracks Anne Arundel Community College s computer technologies courses have been organized into 10 suggested tracks. The tracks are arranged to ensure that students have the
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College
167 th Air Wing Fast Track Cyber Security Blue Ridge Community and Technical College Information Security Certificate: Designed to introduce students to programming, security basics, network monitoring,
MW 515-545, TU 1-3; and other times by appointment
CSUS, COLLEGE OF ENGINEERING AND COMPUTER SCIENCE Department of Computer Science CSC 154 - Computer System Attacks and Countermeasures/ C Sc 254 Network Security (MW 7-8:15p; RVR 1008), Fall 2013 Instructor:
Learn Ethical Hacking, Become a Pentester
Learn Ethical Hacking, Become a Pentester Course Syllabus & Certification Program DOCUMENT CLASSIFICATION: PUBLIC Copyrighted Material No part of this publication, in whole or in part, may be reproduced,
Information Security Attack Tree Modeling for Enhancing Student Learning
Information Security Attack Tree Modeling for Enhancing Student Learning Jidé B. Odubiyi, Computer Science Department Bowie State University, Bowie, MD and Casey W. O Brien, Network Technology Department
Guidelines for Website Security and Security Counter Measures for e-e Governance Project
and Security Counter Measures for e-e Governance Project Mr. Lalthlamuana PIO, DoICT Background (1/8) Nature of Cyber Space Proliferation of Information Technology Rapid Growth in Internet Increasing Online
ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM
ITSY-2459-8001 Security Assessment/Auditing Spring 2010 Professor: Zoltan Szabo D111 LEC TR 11:20AM 12:45PM D111 LAB TR 12:50PM 02:15PM CATALOG DESCRIPTION: Capstone experience for the security curriculum.
Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs
Network Security Ola Lundh [email protected] Schedule/ time-table: landris.hh.se/ (NetwoSec) Course home-page: hh.se/english/ide/education/student/coursewebp ages/networksecurity cisco.netacad.net Packet
FedVTE Training Catalog SPRING 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SPRING 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov If you need any assistance please contact the FedVTE Help Desk here or email the
CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources
CEH Certified Ethical Hacker More Than 100 Success Secrets: Over 100 Professional Security Testers Most Asked Questions and Resources CEH 100 Success Secrets Copyright 2008 Notice of rights All rights
NETWORK SECURITY (W/LAB) Course Syllabus
6111 E. Skelly Drive P. O. Box 477200 Tulsa, OK 74147-7200 NETWORK SECURITY (W/LAB) Course Syllabus Course Number: NTWK-0008 OHLAP Credit: Yes OCAS Code: 8131 Course Length: 130 Hours Career Cluster: Information
BUY ONLINE FROM: http://www.itgovernance.co.uk/products/497
CISSP EXAM CRAM 2 1. The CISSP Certification Exam. Assessing Exam Readiness. Taking the Exam. Multiple-Choice Question Format. Exam Strategy. Question-Handling Strategies. Mastering the Inner Game. 2.
FedVTE Training Catalog SUMMER 2015. advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov
FedVTE Training Catalog SUMMER 2015 advance. Free cybersecurity training for government personnel. fedvte.usalearning.gov Access FedVTE online at: fedvte.usalearning.gov If you need any assistance please
