Persistent Attack and Exploitation: Offense
This course examines offensive hacking techniques as a vital part of network defense. This process is explored using a Penetration Testing framework and uses current hacking tools and techniques. During the course simple but effective countermeasures are offered as steps in improving the Network Defense of the target.
- Footprinting a target is step one and focuses on gathering information in the public arena that is freely available and not always recognized as dangerous.
- Enumeration, step two, is based on discovered targets and provides more in-depth and potentially damaging information for use against the target.
- Attack, step three, is based on vulnerable and exploitable targets identified in steps one and two. Automated tools and simple, basic attack techniques are combined to totally compromise vulnerable targets on the network.
- Escalation, the final step, is designed to solidify the hold on the target and pilfer and extract maximum information from the compromised targets.
Security+ certification or equivalent experience. Certified Ethical Hacker training is recommended but not required. Students should have familiarity with Windows and Linux/Unix operating systems and a solid grasp of TCP/IP and associated networking concepts.
This course is designed for system or network administrators or other positions with information security or network responsibilities including analysts, auditors and consultants.
E-mail email@example.com or call (443) 692-6599:
- if you have any questions about this course,
- to be notified when this course and any closely related courses are scheduled for open enrollment,
- to request a quote for group training at your location or ours.