This course examines network security testing, including testing countermeasures against malware threats; denial of service (DOS) and distributed denial of service (DDOS) attacks; email; Web; and Wireless using a layered approach requiring design, implementation, and testing of attack countermeasures.
Learning Objectives
- Given the description of an established organization and its fully deployed information systems, examine how to leverage the freely available tool sets to build a test environment to evaluate the strength of its security infrastructure.
- Given the layout of an organization’s networks and its hardware and software components, evaluate where the networks are most vulnerable.
- Given the description of an established organization and its data infrastructure, perform tests to evaluate the vulnerabilities of the infrastructure and develop mitigation strategies to lower/eliminate risks to an acceptable level.
- Given the description of an established organization and its data infrastructure, assess the vulnerabilities as it relates its gateway to the Internet.
- Given the description of an established organization and its data infrastructure, investigate all risks associated with its data assets.
- Given the description of an established organization and its data infrastructure, develop continuous process improvements to counter-attack new tools and strategies that allow hackers to penetrate an organization data infrastructure.
- Given the description of an established organization and its infrastructure, explain how you would execute a pen test.
- Given the description of an established organization and its resources, evaluate the ethical and legal implications of performing white hat activities.