This Ethical Hacking course is designed to educate IT support staff in order to allow them to defend systems against hacking attacks. During this course, delegates will:
Learn about and understand the hacker mindset.
Become familiar with the tools and methodologies that are used to attack systems.
Understand how to defend against the threats posed by hackers, crackers and any individual intent on causing disruption to your IT systems.
Have an informed and current understanding of the present-day methodologies, tools, and vulnerabilities which allow these exploits to happen.
Training Course Objectives
On completing this course, you will be able to:
Be aware of the tools, techniques and methodologies employed by hackers from dedicated lab environment.
Understand how hackers can collect and assimilate information about an organisationís infrastructure whilst avoiding detection.
Understand how information may be used to assess your IT systemsí weaknesses and subsequently launch an attack against target systems.
Understand the techniques that are typically used to gain access into a system.
Understand the types of tools that are used to elevate access on a system.
Understand the techniques used by hackers to conceal their tracks and the methods via which access to a target system may be maintained.
Know the limitations of security firewall systems and the tools used to bypass them.
Understand how hackers bypass Intrusion Detection Systems (IDS).
Understand Measures that you can employ to secure and protect information against hacker attacks.
Who should attend
This course is a must-have for all people responsible for
Security of IT systems
Support of IT systems
IT Security Professionals
With the rapid increase in the numbers of hackers and hacker tools, the increasing complexity of IT systems and networks, and with the continuous announcement of security vulnerabilities in operating systems, applications software, and network infrastructure devices, all IT support professionals must now become knowledgeable in the essentials of network security and vulnerability assessment.
Delegates must have a basic understanding of TCP/IP protocols, and a technical background in Microsoft Windows 2000, Microsoft Windows XP or UNIX operating systems.
Lifetime Post-Course Support
After completing this course, delegates receive lifetime post-training support from LEVER Technology Group PLC, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.
An Introduction to Hacking
A background into hacking
Understanding hacker genres
Review of high profile attacks
Risks to your Business
Impacts on your organisation and its reputation
Operational and financial risks
A review of TCP/IP protocols and ports
IP, TCP, UDP, ICMP
TCP and UDP ports
Spoofing and session hijacking
Denial of Service attacks (DoS)
The anatomy of a typical attack
Hacker Tools and Techniques
The categories of tools and techniques employed by hackers
How information about a target can be acquired
Target Scanning, System Detection
Examining the target landscape
Sophisticated scanning methods
Operating system detection
How attackers probe for weaknesses
The use of 'Firewalking' to map out access controls
Exploitation and Privilege Escalation
How easily can access be gained to a system?
How privilege is escalated to achieve full control of Windows and UNIX systems
Trojans, Back-Doors and Root Kits
Practical hands-on use of 'Trojan horses' and 'back doors'
Working with root kits to hide the presence of a hacker at the application and kernel level