This course provides hands-on training to help students master the same techniques that hackers use to penetrate network systems, and leverage them ethically to protect their own infrastructure.
Learning Objectives
Students will be able to grasp the step-by-step methodology and tactics that hackers use to penetrate network systems, understand the finer nuances of trojans, backdoors and countermeasures, get a better understanding of IDS, firewalls, honeypots and wireless hacking, master advanced hacking concepts, including mobile device and smart phone hacking, writing virus codes, exploit writing & reverse engineering and corporate espionage, gain expertise on advanced concepts such as advanced network packet analysis, securing IIS & Apache web servers, Windows system administration using PowerShell, and hacking SQL and Oracle database, cover the latest developments in mobile and web technologies including Android, iOS, BlackBerry, Windows Phone and HTML 5, and learn advanced log management for information assurance and allow you to manage information security with more clarity.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Competency Areas
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.