This hands-on course teaches you how to hack into information systems using ethical standards. You will learn system and network penetration testing, the tools and techniques used to exploit vulnerabilities such as social engineering, buffer overflows, etc., and how to defend against attacks.
Learning Objectives
- Assist an organization in evaluating their current security posture by identifying gaps in security
- Audit organizational compliance with regulatory and legislative Information Assurance (IA) requirements
- Identify logical weaknesses in computers and networks as well as physical weaknesses and weaknesses in policies, procedures and practices relating to the network and the organization
- Test the network perimeter defense mechanisms to ensure safe cyber boundaries
- Simulate methods that intruders use to gain unauthorized access to an organization's networked systems and then compromise them
- Deploy proprietary and/or open source tools to test known technical vulnerabilities in networked systems
- Determine which vulnerabilities are exploitable and the degree of information exposure or network control that the organization could expect an attacker to achieve after successfully exploiting vulnerability
- Recommend appropriate mitigation procedures against discovered vulnerabilities and security gaps
- Prepare penetration testing deliverables including reports and documentation
- Model the ethics of a licensed Penetration Tester
Framework Connections
The materials within this course focus on the NICE Framework Task, Knowledge, and Skill statements identified within the indicated NICE Framework component(s):
Specialty Areas
- Cyber Defense Analysis
- Cyber Operations
- Exploitation Analysis
- Threat Analysis
- Vulnerability Assessment and Management
Feedback
If you would like to provide feedback on this course, please e-mail the NICCS team at NICCS@mail.cisa.dhs.gov. Please keep in mind that NICCS does not own this course or accept payment for course entry. If you have questions related to the details of this course, such as cost, prerequisites, how to register, etc., please contact the course training provider directly. You can find course training provider contact information by following the link that says “Visit course page for more information...” on this page.