Course Title: Penetration Testing: Network Threat Testing, 1st Edition



Similar documents
Course Title: Penetration Testing: Communication Media Testing, 1st Edition

Course Title: Penetration Testing: Security Analysis

Course Title: Penetration Testing: Network & Perimeter Testing

Course Title Penetration Testing: Procedures & Methodologies

Course Title: Disaster Recovery, 1st Edition

Hackers are here. Where are you?

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

Course: Information Security Management in e-governance. Day 1. Session 5: Securing Data and Operating systems

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Hackers are here. Where are you?

EC-Council Certified Security Analyst (ECSA)

Best Practices For Department Server and Enterprise System Checklist

G/On. Basic Best Practice Reference Guide Version 6. For Public Use. Make Connectivity Easy

2. From a control perspective, the PRIMARY objective of classifying information assets is to:

Detailed Description about course module wise:

Certified Ethical Hacker (CEH)

[CEH]: Ethical Hacking and Countermeasures

The purpose of this report is to educate our prospective clients about capabilities of Hackers Locked.

CEH Version8 Course Outline

EC Council Certified Ethical Hacker V8

External Supplier Control Requirements

Enterprise Cybersecurity Best Practices Part Number MAN Revision 006

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Security aspects of e-tailing. Chapter 7

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

Analyze. Secure. Defend. Do you hold ECSA credential?

Course Title: Virtualization Security, 1st Edition

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

ICANWK406A Install, configure and test network security

Put into test the security of an environment and qualify its resistance to a certain level of attack.

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

FORBIDDEN - Ethical Hacking Workshop Duration

Principles of Information Assurance Syllabus

ensuring security the way how we do it

Fundamentals of Information Systems Security Unit 1 Information Systems Security Fundamentals

CRYPTUS DIPLOMA IN IT SECURITY

Cisco Security Optimization Service

Unified Security Anywhere HIPAA COMPLIANCE ACHIEVING HIPAA COMPLIANCE WITH MASERGY PROFESSIONAL SERVICES

Guideline on Auditing and Log Management

Cisco Advanced Services for Network Security

GFI White Paper PCI-DSS compliance and GFI Software products

Network Security and the Small Business

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

a) Encryption is enabled on the access point. b) The conference room network is on a separate virtual local area network (VLAN)

Penetration testing & Ethical Hacking. Security Week 2014

SonicWALL Security Dashboard

FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.

Computer Security: Principles and Practice

Common Cyber Threats. Common cyber threats include:

Loophole+ with Ethical Hacking and Penetration Testing

Information Technology Engineers Examination. Information Security Specialist Examination. (Level 4) Syllabus

Countermeasures against Bots

Basics of Internet Security

Vulnerability Assessment and Penetration Testing

Global Partner Management Notice

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

TABLE OF CONTENT. Page 2 of 9 INTERNET FIREWALL POLICY

Ovation Security Center Data Sheet

CloudCheck Compliance Certification Program

IT General Controls Domain COBIT Domain Control Objective Control Activity Test Plan Test of Controls Results

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)

EC-Council. Program Brochure. EC-Council. Page 1

7 Network Security. 7.1 Introduction 7.2 Improving the Security 7.3 Internet Security Framework. 7.5 Absolute Security?

How Your Current IT Security System Might Be Leaving You Exposed TAKEAWAYS CHALLENGES WHITE PAPER

ASDI Full Audit Guideline Federal Aviation Administration

NETWORK AND CERTIFICATE SYSTEM SECURITY REQUIREMENTS

The Roles of Software Testing & QA in Security Testing

Effective Software Security Management

The Key to Secure Online Financial Transactions

California State University, Chico. Information Security Incident Management Plan

Wireless Network Security

MAXIMUM DATA SECURITY with ideals TM Virtual Data Room

By David G. Holmberg, Ph.D., Member ASHRAE

CS5008: Internet Computing

Guidelines for Website Security and Security Counter Measures for e-e Governance Project

CYBERTRON NETWORK SOLUTIONS

CMPT 471 Networking II

Unified Threat Management, Managed Security, and the Cloud Services Model

Rule 4-004M Payment Card Industry (PCI) Monitoring, Logging and Audit (proposed)

Business ebanking Fraud Prevention Best Practices

Comparison of Firewall, Intrusion Prevention and Antivirus Technologies

Penetration Testing Service. By Comsec Information Security Consulting

A Systems Engineering Approach to Developing Cyber Security Professionals

Windows Remote Access

ensure prompt restart of critical applications and business activities in a timely manner following an emergency or disaster

IBM Managed Security Services Vulnerability Scanning:

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

Network Security. Tampere Seminar 23rd October Overview Switch Security Firewalls Conclusion

Medical Device Security Health Group Digital Output

Ovation Security Center Data Sheet

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

BUILDING A SECURITY OPERATION CENTER (SOC) ACI-BIT Vancouver, BC. Los Angeles World Airports

Transcription:

Course Title: Penetration Testing: Network Threat Testing, 1st Edition Page 1 of 6

Course Description: The Security Analyst Series from EC-Council Press is comprised of five books covering a broad base of topics in advanced penetration testing and information security analysis. The content of this program is designed to expose the reader to groundbreaking methodologies in conducting thorough information security analysis, as well as advanced penetration testing techniques. Armed with the knowledge from the Security Analyst series, along with proper experience, readers will be able to perform the intensive assessments required to effectively identify and mitigate risks to the security of the organization's infrastructure. PENETRATION TESTING: NETWORK THREAT TESTING coverage includes penetration testing of denial of service, password cracking, applications, database, viruses and Trojans, log management, data leakage and file integrity. Certificate Info Penetration Testing: Network Threat Testing Who Should Attend? This course will significantly benefit Network administrators, Firewall Administrators, Security Testers, System Administrators and Risk Assessment professionals. Course Duration: 2 days (9:00 5:00) CPE/ECE Qualification 16 ECE Credits awarded for attendance (1 for each classroom hour) Suggested Retail: $799 USD Page 2 of 6

Required Courseware: Visit www.cengage.com/community/eccouncil and click on Training Workshops for ordering details. What s included? Physical Courseware 1 year Access To EC-Council Student LMS for Practical Labs (if applicable), testing, and Certificate Course + Supplement Cost: See the Training Workshops section at www.cengage.com/community/eccouncil for current pricing information. Related Certificates: Penetration Testing: Security Analysis Penetration Testing: Network and Perimeter Testing Penetration Testing: Communication Media Testing Penetration Testing: Procedures & Methodologies Page 3 of 6

1. Denial-Of-Service Penetration Testing Course Briefing: This module explains that the purpose of performing a DoS attack is to bring down the performance of a website. It explains that the DoS attack and DDoS are similar attacks. The difference is that DDoS is a distributed attack, wherein the attack is launched from various unsuspected sources. A look at the DoS attacks, its effects, attacker s strategy, stability, performance and penetration testing. 2. Password-Cracking Penetration Testing This module explains that Passwords protect computer resources and files from unauthorized access by malicious users and how companies use a combination of passwords and user IDs to protect their resources against intrusions by hackers and thieves. The tool that simplifies migration synchronization of that system, SAMDUMP is also explained. 3. Application Penetration Testing In software engineering, a web application is an application delivered to users from a web server over a network such as the World Wide Web or an intranet. Web applications are popular due to the ubiquity of the web browser as a client, sometimes called a thin client. Application testing involves meticulously testing an application under certain conditions to check for vulnerabilities in the code. The module discusses various steps in the penetration testing of web applications and the tools that are useful for the same. 4. Database Penetration Testing The module discusses the various steps in database penetration testing including using SQL plus to enumerate system tables, MySQL Server database testing, and Port Scan UDP/TCP Ports (TCP/UDP). The module also discusses various tools that can be used for dictionary attacks aimed at cracking database login details. 5. Virus and Trojan Detection The module discusses the steps to be followed for detecting Trojans and viruses in the system, and lists various spyware detectors, anti-trojans, and antivirus software. 6. Log Management Penetration Testing Security software logs are the logs that provide the record of instances of security software. Few of the security software are antimalware software, Intrusion detection and prevention systems, remote access software, web proxies, vulnerability management software, authentication servers, network quarantine servers, routers, firewalls, etc. The module discusses the need for log management, challenges in log management, the steps for log management penetration testing, and lists guidelines for secure log management. 7. File Integrity Checking This module familiarizes File integrity, which verifies if the file is same as the original file and if there are any modifications in the file. It explains about Faulty storage media, Transmission error, Cyclic Page 4 of 6

Redundancy Check (CRC) function takes input data stream of any length and produces an output value of a certain fixed size, Hash-based verification and tools such as md5sum and PasswordZilla. 8. Data Leakage Penetration Testing Confidential data of the organization includes important information about the company, its clients, products, planning of new product, and its partners. An organization needs to perform data leakage penetration testing to protect its confidential data from malicious users. The module explains how data can be leaked, steps for data leakage penetration testing, discusses data privacy and protection acts, and various data protection tools Course Outline: Chapter 1: Denial-Of-Service Penetration Testing Introduction to Denial-Of-Service Penetration Testing Distributed Denial-Of-Service Attack Conducting a Denial-Of-Service Penetration Test Web Testing Tools Java Test Tools Java Development Tools Chapter 2: Password-Cracking Penetration Testing Introduction to Password-Cracking Penetration Testing Password-Cracking Techniques Types of Password-Cracking Attacks Steps in Password-Cracking Penetration Testing Tools Chapter 3: Application Penetration Testing Introduction to Application Penetration Testing Defects Requirements and Design Testing Web Application Penetration Testing Application-Testing Tools Chapter 4: Database Penetration Testing Introduction to Database Penetration Testing Port Scanning Page 5 of 6

Database Penetration Testing Steps Chapter 5: Virus and Trojan Detection Introduction to Virus and Trojan Detection Using connection and port information to detect Trojans Using process information to detect Trojans Detecting boot-sector viruses Enumerating the different tools used to detect viruses and Trojans Chapter 6: Log Management Penetration Testing Introduction to Log Management Penetration Testing Log File Overview The Need for Log Management Steps for Log Management Penetration Testing Checklist for Secure Log Management Chapter 7: File Integrity Checking Introduction to File Integrity Checking File Integrity Overview Integrity-Checking Techniques File Integrity-Checking Tools Chapter 8: Data Leakage Penetration Testing Introduction to Data Leakage Penetration Testing Points of Data Leakage Sensitive Data Steps for Data Leakage Penetration Testing Data Privacy and Protection Acts Data Protection Tools Page 6 of 6