- Learn how hackers attack computers and networks, and how to protect Windows and Linux systems.
- Legal restrictions and ethical guidelines will be taught and enforced.
- Students will perform many hands-on labs, both attacking and defending, using port scans, Footprinting, buffer overflow exploits, SQL injection, privilege escalation, Trojans, and backdoors.
Learning Objectives
- Determine what an ethical hacker can and cannot do legally, and evaluate credentials and roles of penetration testers.
- Perform reconnaissance on a target network using a variety of scanning and probing techniques.
- Enumerate and classify Microsoft and Linux Operating Systems vulnerabilities.
- Take control of Web Servers and wireless networks, and protect them.
- Evaluate and select cryptography and hashing methods, and perform attacks against them.
- Select and implement security devices, including routers, firewalls, Intrusion Detection Systems, and honeypots.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.