• Classroom
  • Online, Instructor-Led
Course Description
  • Learn how hackers attack computers and networks, and how to protect Windows and Linux systems.
  • Legal restrictions and ethical guidelines will be taught and enforced.
  • Students will perform many hands-on labs, both attacking and defending, using port scans, footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.

Learning Objectives

  1. Determine what an ethical hacker can and cannot do legally, and evaluate credentials and roles of penetration testers.
  2. Perform reconnaissance on a target network using a variety of scanning and probing techniques.
  3. Enumerate and classify Microsoft and Linux Operating Systems vulnerabilities.
  4. Take control of Web Servers and wireless networks, and protect them.
  5. Evaluate and select cryptography and hashing methods, and perform attacks against them.
  6. Select and implement security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.

Framework Connections

The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):

Specialty Areas

  • Exploitation Analysis
  • Cyber Investigation
  • Systems Analysis

Specialty Areas have been removed from the NICE Framework. With the recent release of the new NICE Framework data, updates to courses are underway. Until this course can be updated, this historical information is provided to give better context as to how it can help you with your cybersecurity goals.

Feedback

If you would like to provide feedback for this course, please e-mail the NICCS SO at NICCS@hq.dhs.gov.