• Classroom
  • Online, Instructor-Led
Course Description
  • Learn how hackers attack computers and networks, and how to protect Windows and Linux systems.
  • Legal restrictions and ethical guidelines will be taught and enforced.
  • Students will perform many hands-on labs, both attacking and defending, using port scans, Footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.

Learning Objectives

  1. Determine what an ethical hacker can and cannot do legally, and evaluate credentials and roles of penetration testers.
  2. Perform reconnaissance on a target network using a variety of scanning and probing techniques.
  3. Enumerate and classify Microsoft and Linux Operating Systems vulnerabilities.
  4. Take control of Web Servers and wireless networks, and protect them.
  5. Evaluate and select cryptography and hashing methods, and perform attacks against them.
  6. Select and implement security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):