The purpose of this course is to give students of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. With real-world examples that reflect today's most important and relevant security topics, this course addresses how and why people attack computers and networks, so that students can be armed with the knowledge and techniques to successfully combat hackers. Because the world of information security changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. Many hands-on exercises are included, which allow students to practice skills as they are learned.
Specific topic coverage includes:
- Ethics of Hacking and Cracking
- Scanning Tools
- TCP/IP Vulnerabilities
- Encryption and Password Cracking
- Session Hijacking
- Hacking Network Devices
- Trojan Horses
- Denial-of-Service Attacks
- Buffer Overflows
- Programming Exploits
- Mail Vulnerabilities
- Web Application Vulnerabilities
- Windows Vulnerabilities
- Linux Vulnerabilities
- Incident Handling
This course includes over 50 hacking tools.
This course is taught by a multiple National Cyber Security Instructors.