Describe how perimeter defenses function by ethically scanning and attacking networks
Conduct information systems security audits by understanding the latest security threats, advanced attack vectors, hacking techniques, methodologies and security measures
Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
Create policies and apply countermeasures against social engineering, Distributed Denial-of Service (DDoS) attacks, buffer overflows, and virus creation
Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computer
►Target Audience
IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.
►Course Outline
Day 1
Introduction to Ethical Hacking
Short History of hacking
Current developments
Evolution and growth
What is an “Ethical” Hacker
Types of hackers
Day 2
Hacking methodologies
Key issues plaguing the information security world