Advanced Ethical Hacking and Penetration Testing
The components of the training program include
• 8 hours a day for 4 days
Ethical Hacking is quickly becoming one of the most desired information security skill sets available. In order to master the hacking technologies and defend against hackers, IT professionals will need to immerse themselves into the hacker mindset. Each student will be involved with a hands-on, interactive environment as they are introduced to ethical hacking principles.
During this 4-day intensely hands-on course, the instructor will challenge each student to get into the hacker mindset by first following-along with demonstrations and then actually performing hands-on labs themselves just as they would have to do in a real-world situation. Students will learn to execute penetration testing, system hacking, steganography, and be shown proper countermeasures. Students will also be introduced to concepts of defense in depth, cryptography, policies, physical security, web security, application security, and mobile security.
Check back often for updates or send us an email at training@TASCManagement.com so we can notify you of upcoming courses.
An Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, CompTIA A+ and Network+ certifications, or equivalent knowledge, and 6-9 months experience in networking, including experience configuring and managing TCP/IP. Although not required, students might find it helpful to obtain foundational information from introductory operating system administration courses.
Recommended experience: CompTIA Network+ certification and two years of technical networking experience, with an emphasis on security.
At the completion of this course, students will be able to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others.
Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities.
1. Introduction to Ethical Hacking and Information Gathering
2. Footprinting and Reconnaissance
3. Function of an Ethical Hacker
4. Techniques to Scan and Attack a Network
5. Analyzing System Risk and Weakness
6. Applying Countermeasure
7. Social Engineering
8. Evading IDSs, Firewalls, and Honeypots
9. Buffer Overflow and Cryptography
10.Performing Penetration Testing