Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2)



Similar documents
Certified Ethical Hacker (CEH)

COURSE NAME: INFORMATION SECURITY INTERNSHIP PROGRAM

CRYPTUS DIPLOMA IN IT SECURITY

CYBERTRON NETWORK SOLUTIONS

Venue. Dates. Certified Ethical Hacker (CEH) boot camp. Inovatec College. Nairobi Kenya (exact hotel name to be confirmed

If you know the enemy and know yourself, you need not fear the result of a hundred battles.

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

CEH Version8 Course Outline

Course Content Summary ITN 261 Network Attacks, Computer Crime and Hacking (4 Credits)

National Cyber League Certified Ethical Hacker (CEH) TM Syllabus

SONDRA SCHNEIDER JOHN NUNES

Certified Ethical Hacker Exam Version Comparison. Version Comparison

Certified Ethical Hacker (CEH) Ethical Hacking & Counter Measures Course 9962; 5 Days, Instructor-Led

When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

CONTENTS AT A GMi#p. Chapter I Ethical Hacking Basics I Chapter 2 Cryptography. Chapter 3 Reconnaissance: Information Gathering for the Ethical Hacker

[CEH]: Ethical Hacking and Countermeasures

Professional Penetration Testing Techniques and Vulnerability Assessment ...

Course Duration: 80Hrs. Course Fee: INR (Certification Lab Exam Cost 2 Attempts)

PTSv2 in pills: The Best First for Beginners who want to become Penetration Testers. Self-paced, online, flexible access

Ethical Hacking and Countermeasures 5.0 Course ECEH5.0 5 Days COURSE OVERVIEW AUDIENCE OBJECTIVES OUTLINE


Ethical Hacking v7 40 H.

Course Title: Course Description: Course Key Objective: Fee & Duration:

Vulnerability Assessment and Penetration Testing

Detailed Description about course module wise:

EC Council Certified Ethical Hacker V8

Build Your Own Security Lab

Vinny Hoxha Vinny Hoxha 12/08/2009

Certified Cyber Security Expert V Web Application Development

FSP-201: Ethical Hacking & IT Security

Overview of Network Security The need for network security Desirable security properties Common vulnerabilities Security policy designs

SCP - Strategic Infrastructure Security

Ethical Hacking and Information Security. Foundation of Information Security. Detailed Module. Duration. Lecture with Hands On Session: 90 Hours

Information Security. Training

Ethical Hacking Course Layout

Network Security. 1 Pass the course => Pass Written exam week 11 Pass Labs

Vulnerability Assessment and Penetration Testing. CC Faculty ALTTC, Ghaziabad

EC-Council Certified Security Analyst (ECSA)

Demystifying Penetration Testing for the Enterprise. Presented by Pravesh Gaonjur

Penetration Testing with Kali Linux

ETHICAL HACKING. By REAL TIME FACULTY

Course Content: Session 1. Ethics & Hacking

RMAR Technologies Pvt. Ltd.

LINUX / INFORMATION SECURITY

A Systems Engineering Approach to Developing Cyber Security Professionals

EC-Council Certified Security Analyst / License Penetration Tester (ECSA/LPT) v4.0 Bootcamp

EC-Council. Program Brochure. EC-Council. Page 1

INFORMATION SECURITY TRAINING

EC-Council. Certified Ethical Hacker. Program Brochure

Security Certifications. Presentatie SecCert 101 Jordy Kersten MSc., ISC2 Ass., CEH, OSCP

Application Security Testing

Global Cyber Range (GCR) Empowering the Cybersecurity Professional (CyPro)

Demystifying Penetration Testing

Certified Penetration Testing Specialist

CH EHC EC-Council Ethical Hacking and Countermeasures [v.9]

CERTIFIED PENETRATION TESTING CONSULTANT

Presented By: Holes in the Fence. Agenda. IPCCTV Attack. DDos Attack. Why Network Security is Important

ASK PC Certified Information Systems Security Expert - CISSE

Web Application Threats and Vulnerabilities Web Server Hacking and Web Application Vulnerability

INTRUSION DETECTION SYSTEM (IDS) by Kilausuria Abdullah (GCIH) Cyberspace Security Lab, MIMOS Berhad

Ethical Hacking & Cyber Security Workshop

Client logo placeholder XXX REPORT. Page 1 of 37

Audience. Pre-Requisites

CIS 4204 Ethical Hacking Fall, 2014

Course Outline: Certified Ethical Hacker v8. Learning Method: Instructor-led Classroom Learning

Learn Ethical Hacking, Become a Pentester

Attack Frameworks and Tools

Hands-On Ethical Hacking and Network Defense Second Edition Chapter 8 Desktop and Server OS Vulnerabilities

Certified Penetration Testing Specialist

INDUSTRIAL CONTROL SYSTEMS CYBER SECURITY DEMONSTRATION

The International Certification in IT Security Training Program. fcch. foresec certified computer hacking

VMware: Advanced Security

Understanding Security Testing

Network Incident Report

Kerem Kocaer 2010/04/14

Summer Training Program CCSE V3.0 Certified Cyber Security Expert Version 3.0

ITEC441- IS Security. Chapter 15 Performing a Penetration Test

EC-Council C E. Hacking Technology. v8 Certified Ethical Hacker

Penetration Testing. Presented by

CSE331: Introduction to Networks and Security. Lecture 32 Fall 2004

EC Council Security Analyst (ECSA)

FORBIDDEN - Ethical Hacking Workshop Duration

Network/Internet Forensic and Intrusion Log Analysis

Security: Attack and Defense

FRONT RUNNER DIPLOMA PROGRAM INFORMATION SECURITY Detailed Course Curriculum Course Duration: 6 months

An Introduction to Network Vulnerability Testing

HACKING RELOADED. Hacken IS simple! Christian H. Gresser

Ed Ferrara, MSIA, CISSP Fox School of Business

INFORMATION SECURITY TESTING

InfoSec Academy Pen Testing & Hacking Track

Network Security. Computer Security & Forensics. Security in Compu5ng, Chapter 7. l Network Defences. l Firewalls. l Demilitarised Zones

Computer Networks & Computer Security

Loophole+ with Ethical Hacking and Penetration Testing

FIREWALLS & NETWORK SECURITY with Intrusion Detection and VPNs, 2 nd ed. Chapter 4 Finding Network Vulnerabilities

Transcription:

Computer Forensics Training - Digital Forensics and Electronic Discovery (Mile2) Course number: CFED Length: 5 days Certification Exam This course will help you prepare for the following exams: CCE -- Certified Computer Examiner CFCE -- Certified Forensic Computer Examiner Course Overview The CFED course provides coverage on techniques concerning electronic records such as computer network logs, e-mails, word processing files, and.jpg picture files that provide government and corporations with important (and sometimes essential) evidence in criminal and civil cases. Prerequisites Experience in using a computer. Audience CFED is intended for law enforcement agents, legal professionals, corporate security personnel and other IT professionals who require systematic guidance on issues that arise in connection with electronic evidence in criminal and civil investigations. Course Materials The student kit includes a comprehensive workbook and other necessary materials for this class. Course Outline: Chapter 1 Introduction to Ethical Hacking Can Hacking be Ethical? What does a Malicious Hacker Do? Classification of Hackers What do Ethical Hackers Do? Modes of Ethical Hacking Chapter 2 Footprinting Revisiting Reconnaissance Demo - Sam Spade & Visual Route

Demo - Using Google Network Range, Traceroute & Tools Demo - Email Tracking Information Gathering Methodology Chapter 3 Scanning War Dialers TCP Three Way Handshake Demo - SuperScan Port Scanning Techniques Port Scanning Tools Scanning Tools Demo - Cheops & nmap Chapter 4 Enumeration Net Bios Null Sessions Demo - Creating a Null User Session Countermeasure to Null Sessions Hacking Tools Demo - Using SolarWinds How to Identify Accounts More Hacking Tools Demo - Cain Enable Chapter 5 System Hacking Password Guessing Hacking Tool - KerbCrack Demo - LoftCrack Privilege Escalation Password Cracking Demo - Metasploit Project SMBRelay Man-In-The-Middle Scenario More Hacking Tools Countermeasures to Installing a Rootkit Demo - Using an Alternate Data Stream Demo - BlindSide Chapter 6 Trojans & Backdoors Backdoors Demo - EliteWrap Tools BOSniffer and FireKiller Chapter 7 Sniffers Introduction to Sniffers Demo - Ethereal Passive & Active Sniffing Programs Demo - Using SMAC Sniffing HTTPS and SSH Demo - Sniffing with Kaine Enable

Chapter 8 Denial of Service Denial of Service Attacks IDS Companies & Firewalls Demo - Ping of Death DOS Chapter 9 Social Engineering What is Social Engineering? Adding Extra Security into your Corporation Chapter 10 Session Hijacking Understanding Session Hijacking Demo - T-Sight Protect against Session Hijacking Chapter 11 Hacking Web Servers Hacking Tools & Countermeasures Demo - Simple Internet Client Attack Unicode Attacks & IIS Log Files Directory Traversal Tools Demo - N-Stealth Security Scanner Hacking Web Servers Review Chapter 12 Web Application Vulnerabilities Understanding Web Application Security Demo - BlackWidow and BurpSpider Hidden Fields Demo - Man-In-The-Middle Attack XXS Web Application Demo - Performing Reconnaissance Chapter 13 Web Based Password Cracking Password Guessing Demo - SnadBoy's Revelation Chapter 14 SQL Injection Shutting Down SQL Server Demo - SQL Injection SQL Dictionary Chapter 15 Hacking Wireless Networks Network Hacking Tools Demo - "The Broken" Wireless Hacking & Cracking Chapter 16 IDS, Firewalls & Honey Pots Application Protocol Verification Demo - Engage Packet Builder

TCP Replay Bypassing Firewalls Demo - KFSensor IDS, Firewall and Honey Pots Review Chapter 17 Linux Hacking Compiling Programs in Linux Demo - Nmap Front End Linux Hacking Tools Linux Hacking Review Chapter 18 Buffer Overflows Different Types of Buffer Overflows Demo - RPC Exploit Preventing Buffer Overflows Chapter 19 Cryptography Different Types of Cryptography RC5 & Rainbow Tables Demo - How to Create Rainbow Tables Chapter 20 Virus and Worms Terminologies How is a worm different from virus? Access Methods & Modes of Infections Life Cycle of a Virus Writing a Simple Virus Program Prevention is Better Than a Cure Anti-Virus Software Chapter 21 Physical Security Understanding Physical Security What is the need of Physical Security? Company Surroundings & Premises Reception Wireless Access Points Security of Other Equipment Wiretapping, Remote Access & Spying Chapter 22 Penetration Testing Penetration Testing Methodology Open Source vs Proprietary Methodologies Starting Point and Ending Points of Testing Selecting the Right Tools Penetration Testing Tools Gathering Network Information Different Types of Threats More Tools Demo - Nessus Security Analyzer Reports and Logs

Ethical Hacker Course Closure