Class Details

Price: $1,950

Course Includes:

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Full breakfast with a variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available all day
  • Freshly baked cookies every afternoon - * only at participating locations

This training experience will cover the following topics in depth, threat identification, insider threat prevention, detection and mitigation, assessment of security assurance, information terrorism, information security management standards, public policy drivers, the role of information security professionals and much more. This course takes a holistic approach to cyber security and information assurance by treating both the technical as well as managerial sides of the field. 

Get Your Group Trained for Less with Our Federal Training Dollars Savings Plan


 

Course Outline

  • Hacking: The Next Generation
  • TCP/IP Review
  • Cryptographic Concepts
  • Footprinting the Environment
  • Scanning the Environment and Network
  • System Enumeration and System Hacking
  • Wireless Vulnerabilities
  • Web Applications and Cloud Technologies
  • Malware
  • Sniffers, Session Hijacking, and Denial of Service
  • Backtrack R3
  • Social Engineering
  • Incident Response 
  • Defensive Technologies

Labs

  • Assessing and Securing Systems on a Wide Area Network (WAN)
  • Applying Encryption and Hashing Algorithms for Secure Communications
  • Data Gathering and Footprinting on a Targeted Website
  • Using Ethical Hacking Techniques to Exploite a Vulnerable Workstation
  • Attacking a Vulnerable Web Applicaation and Database
  • Identifying and Removing Malware on a Windows System
  • Analyzing Network Traffice to Create a Baseline Definition
  • Auditing a Wireless Network and Planning for a Secure WLAN Implementation
  • Investigating and Responding to Security Incidents
  • Securing the Network with an Intrusion Detection System (IDS)

 

Objectives

At the conclusion of this course, students will be able to do the following:

  • Explain the history and current state of hacking and penetration testing
  • Describe cryptology
  • Identify common information gathering tools and techniques
  • Analyze system vulnerabilities exploited by hackers
  • Perform web and database attacks
  • Remove trojans, backdoors, and malware from infected systems
  • Perform network traffic analysis and sniffing by using appropriate tools
  • Analyze wireless network vulnerabilities exploited by hackers
  • Perform incident handling by using appropriate methods
  • Compare and contrast defensive technologies