Course Overview
This five (5) day course begins with an examination of the landscape, key terms, and concepts that a security professional needs to know about hackers and computer criminals who break into networks, steal information, and corrupt data. It goes on to review the technical overview of hacking: how attacks target networks and the methodology they follow. Finally, students will study those methods that are most effective when dealing with hacking attacks, especially in an age of increased reliance on the Web.
By the end of this course, students will be able to:
- Understand basic hacking techniques and strategies
- Gain an understanding of cyber criminals and their motives
- Engage in labs and activities
- Get a technical overview of hacking tools
- Analyze cyber hacking methodologies from the perspective of tje Red Team
- Practice and perform pen tests
Schedule
Currently, there are no public classes scheduled. Please contact a Phoenix TS Training Consultant to discuss hosting a private class at 240-667-7757.
Course Outline
Part One
Hacker Techniques and Tools
- Module One: Hacking: The Next Generation
- Module Two: TCP/IP Review
- Module Three: Cryptographic Concepts
- Module Four: Four Physical Security
Part Two
A Technical and Social Overview of Hacking
- Module Five: Footprinting Tools and Techniques
- Module Six: Port Scanning
- Module Seven: Enumeration and Computer System Hacking
- Module Eight: Wireless Vulnerabilities
- Module Nine: Web and Database Attacks
- Module Ten: Malware
- Module Eleven: Sniffers, Session Hijacking, and Denial of Service Attacks
- Module Twelve: Linux and Penetration Testing
- Module Thirteen: Social Engineering
Part Three
Incident Response and Defensive Technologies
- Module Fourteen: Incident Response
- Module Fifteen: Defensive Technologies