1. Ethical Hacking for IT Professionals
Course Outline
NuOpus LLC
761 Airport Rd #107
Chapel Hill, NC 27514
919-975-2500
www.nuopus.com
2. Ethical Hacking for IT Professionals
What you will learn
The Ethical Hacking for IT Professionals
• How to use the tools, techniques and methodolo-
provides a foundation in the common
gies employed by hackers
techniques, tools, methodologies, and
• How hackers can accurately collect and assimi-
culture of ethical hacking. late information about an organisation’s infra-
structure whilst avoiding detection
• Measures to secure and protect information
against hacker attacks
The class takes participants through the various
• Limitations of firewalls and the tools used to
stages and elements of a penetration test.
bypass them
Particpants start with the initial information
• Which tools can be used to leverage access on a
discovery and target scanning through to
system
exploitation, privilege escalation, and retaining
• How information may be used to assess weak-
access.
nesses and subsequently launch an attack against
a target How hackers conceal their tracks and the
The course also explores the usage of various tools
route through which access to a target may be
common to Ethical hacking and particpants are
maintained
provided copies of tools to take with them.
• The implications of flawed web applications
security
Benefits
• How web users are at threat
• Participant will learn about the hacker mindset
and become familiar with the tools used to attack
Who should attend
systems
Those responsible for the security of IT systems,
• Participants learn not only how to use tools, but
including but not limited to: System/Network
why they use the various tools
Administrators, Crime Prevention & Protection
• Our state of the art class environment covers
Offices, Auditors, Security Officers, Information
Windows and *NIX operating systems and associ-
Security Professionals & Penetration Testers.
ated server software
• Around 50 hands-on practical exercises are fea-
tured, using a wide range of hacking tools
3. Course style Firewall & IDS evasion
• How attacks may traverse a firewall
This course is hands-on. Participants will actually
• The role of intrusion detection & how it may be
attempt to hack systems during class as exercises are
evaded using advanced techniques
ran. Participants will learn how to apply the tools and
• Hacking prevention
techniques that hackers use.
• Security policy, system integrity, hardening &
monitoring
Delivery is in an interactive format with the use of
• Security tools, vulnerability assessment &
multimedia and practical hands-on workshops. Open
penetration testing
group discussion is strongly encouraged. The course is
designed to educate for the purpose of properly
and much more!
Level & Prerequisites
Duration
A familiarity of TCP/IP and a background in Microsoft
2 days
Windows and/or UNIX is desirable.
Cost
Course content highlights
$500
AN INTrODUCTION TO HACkINg
A history and cultural overview of hacking
Insights into the hacker mindset
Hacker genres
For more info and to register for a class
COMMUNICATION PrOTOCOL BASICS
Provides a fundamental understanding of
contact NuOpus at 866-430-9098
communication protocols
An overview of TCP/IP & Networking
An introduction to ports and protocols
Sniffing and intercepting traffic
Man in the middle attacks
HACkINg MeTHODOLOgIeS
A practical exploration of hacking/penetration testing
methods
Information Discovery
• How information about a target may be gathered
discreetly
• Target profiling
• Using public databases to reveal sensitive
information
• Social engineering
• Target scanning & system detection
• examining the target landscape
• Operation system detection
• Port scanning to reveal openings in the system
exploitation & Privilege escalation
• How access may be gained & privilege escalated
to achieve full control of systems