Ethical Hacking for IT Professionals
                         Course Outline

                      NuOpus LLC
Ethical Hacking for IT Professionals

                                                       What you will learn
The Et...
Course style                                              Firewall & IDS evasion
Upcoming SlideShare
Loading in...5

Ethical Hacking Class


Published on

  • Be the first to comment

  • Be the first to like this

No Downloads
Total Views
On Slideshare
From Embeds
Number of Embeds
Embeds 0
No embeds

No notes for slide

Transcript of "Ethical Hacking Class"

  1. 1. Ethical Hacking for IT Professionals Course Outline NuOpus LLC 761 Airport Rd #107 Chapel Hill, NC 27514 919-975-2500
  2. 2. Ethical Hacking for IT Professionals What you will learn The Ethical Hacking for IT Professionals • How to use the tools, techniques and methodolo- provides a foundation in the common gies employed by hackers techniques, tools, methodologies, and • How hackers can accurately collect and assimi- culture of ethical hacking. late information about an organisation’s infra- structure whilst avoiding detection • Measures to secure and protect information against hacker attacks The class takes participants through the various • Limitations of firewalls and the tools used to stages and elements of a penetration test. bypass them Particpants start with the initial information • Which tools can be used to leverage access on a discovery and target scanning through to system exploitation, privilege escalation, and retaining • How information may be used to assess weak- access. nesses and subsequently launch an attack against a target How hackers conceal their tracks and the The course also explores the usage of various tools route through which access to a target may be common to Ethical hacking and particpants are maintained provided copies of tools to take with them. • The implications of flawed web applications security Benefits • How web users are at threat • Participant will learn about the hacker mindset and become familiar with the tools used to attack Who should attend systems Those responsible for the security of IT systems, • Participants learn not only how to use tools, but including but not limited to: System/Network why they use the various tools Administrators, Crime Prevention & Protection • Our state of the art class environment covers Offices, Auditors, Security Officers, Information Windows and *NIX operating systems and associ- Security Professionals & Penetration Testers. ated server software • Around 50 hands-on practical exercises are fea- tured, using a wide range of hacking tools
  3. 3. Course style Firewall & IDS evasion • How attacks may traverse a firewall This course is hands-on. Participants will actually • The role of intrusion detection & how it may be attempt to hack systems during class as exercises are evaded using advanced techniques ran. Participants will learn how to apply the tools and • Hacking prevention techniques that hackers use. • Security policy, system integrity, hardening & monitoring Delivery is in an interactive format with the use of • Security tools, vulnerability assessment & multimedia and practical hands-on workshops. Open penetration testing group discussion is strongly encouraged. The course is designed to educate for the purpose of properly and much more! Level & Prerequisites Duration A familiarity of TCP/IP and a background in Microsoft 2 days Windows and/or UNIX is desirable. Cost Course content highlights $500 AN INTrODUCTION TO HACkINg A history and cultural overview of hacking Insights into the hacker mindset Hacker genres For more info and to register for a class COMMUNICATION PrOTOCOL BASICS Provides a fundamental understanding of contact NuOpus at 866-430-9098 communication protocols An overview of TCP/IP & Networking An introduction to ports and protocols Sniffing and intercepting traffic Man in the middle attacks HACkINg MeTHODOLOgIeS A practical exploration of hacking/penetration testing methods Information Discovery • How information about a target may be gathered discreetly • Target profiling • Using public databases to reveal sensitive information • Social engineering • Target scanning & system detection • examining the target landscape • Operation system detection • Port scanning to reveal openings in the system exploitation & Privilege escalation • How access may be gained & privilege escalated to achieve full control of systems