Getting the Most Out of this Course...
The Instructor’s Role
The Ethical Hacking course introduces concepts, frameworks, methodologies, and strategies that are effective. The Instructor serves as a guide to lead you through the course with lectures, discussions, and hands-on exercises.
Your Role
Your active participation is important to us. Feel free to share your experiences with the class. Take this chance to build relationships with other professionals in the field. We can all learn from each other. Ask questions—both of the instructor and your fellow trainees. If the Instructor cannot immediately answer your question, the Instructor will write the question down and consult other resources at ISS.
Course Objectives
By the end of this course you will be able to:• Describe how hackers are able to defeat security controls in operating
systems, networked environments and generally circumvent security
mechanisms.
• Identify how security controls can be improved to prevent hackers gaining
access to operating systems and networked environments.
The course is split into four sections:
• Passive Information Gathering.
• Active Information Gathering and Target Mapping.
• Vulnerability Mapping and Exploitation.
• Vulnerability Exploitation
DOWNLOAD |
Info:
File type: PDF
Page: 258
Size: 6MB
0 Comment "Ethical Hacking"
Post a Comment