Ethical Hacking

Getting the Most Out of this Course...

 
Ethical Hacking

 

The Instructor’s Role
The Ethical Hacking course introduces concepts, frameworks, methodologies, and strategies that are effective. The Instructor serves as a guide to lead you through the course with lectures, discussions, and hands-on exercises.



Your Role
Your active participation is important to us. Feel free to share your experiences with the class. Take this chance to build relationships with other professionals in the field. We can all learn from each other. Ask questions—both of the instructor and your fellow trainees. If the Instructor cannot immediately answer your question, the Instructor will write the question down and consult other resources at ISS.


Course Objectives

By the end of this course you will be able to:
• Describe how hackers are able to defeat security controls in operating  

   systems, networked environments and generally circumvent security  
   mechanisms.
• Identify how security controls can be improved to prevent hackers gaining    

   access to operating systems and networked environments.  

The course is split into four sections: 

• Passive Information Gathering.
• Active Information Gathering and Target Mapping.
• Vulnerability Mapping and Exploitation.
• Vulnerability Exploitation


Ethical Hacking
DOWNLOAD


Info: 
File type: PDF
Page: 258
Size: 6MB




0 Comment "Ethical Hacking"

Post a Comment