This course introduces students to common computer vulnerabilities as well as exploits and techniques used by hackers. Students will develop countermeasures to mitigate attacks and strengthen system security. Topics covered include vulnerability scanning, social engineering, denial of service attacks, intrusion detection, buffer overflow and penetration testing.
Learning Objectives
Perform reconnaissance and footprinting procedures to collect information about potential targets.
Describe common social engineering attacks and policies to mitigate them.
Demonstrate password-cracking techniques and develop measures to strengthen passwords.
Deploy Metasploit framework to perform penetration testing on various systems.
Attack web applications using cross-site scripting (XSS), command injection and client-side exploitations.
Perform network analysis using common sniffing tools.
Install backdoors to compromise access privileges and system integrity.
Describe common attacks against cryptographic security measures.
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Threat Analysis
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.