![]() SSUCv3H4sIAAAAAAAEAJ2RS27EIBBE95FyB4u1LYEgTpyrjLJoPnFaw5gI8ETRyHcPHyOxzo563QVdzeP5aRiIhICKvA+PrJJGa/cQPUR0W8J0PLnRGJ1HsBlmdpQKCRHiHkzIV5xIQTRr6q3w9Ld3LlUPrVCKyZFKhIwdC7ssrKFj/LezHj5aFFjNpn7LwF0Qb6yBGuRSW8n1Jxp/66PdURvXadg1ui7l3Smw2cC7m789KtzWzubil/H9xtLK3a0Dm4tlkjMY0WmlWTLOBKVU0NeZcco5Y6R9g1NX1P2sqLNjNkzqhX1OUsp5EuwFpjcq5kkJvXAQsGjN06aOP2qqn+MOAgAA your network |
This course introduces the student to the fundamental procedures of how to perform a thorough and accurate assessment of the network’s security for an organization through the three types of penetration tests: black-box, white-box, and gray-box or crystal-box. Topics include: Fingerprinting/footprinting, scanning, enumeration, honeypots/honeynets, SQL injection, cross site scripting, session hijacking, system hacking (escalating privileges, execution of known application), installation of rootkits, and denial of service attacks. Students also learn how to perform simulated attacked on virtual networks. |