SlideShare une entreprise Scribd logo
1  sur  3
Télécharger pour lire hors ligne
Ethical Hacking for IT Professionals
                         Course Outline




                      NuOpus LLC
                      761 Airport Rd #107
                      Chapel Hill, NC 27514
                      919-975-2500
                      www.nuopus.com
Ethical Hacking for IT Professionals




                                                       What you will learn
The Ethical Hacking for IT Professionals
                                                       •	 How to use the tools, techniques and methodolo-
provides a foundation in the common
                                                          gies employed by hackers
techniques, tools, methodologies, and
                                                       •	 How hackers can accurately collect and assimi-
culture of ethical hacking.                               late information about an organisation’s infra-
                                                          structure whilst avoiding detection
                                                       •	 Measures to secure and protect information
                                                          against hacker attacks
The class takes participants through the various
                                                       •	 Limitations	of	firewalls	and	the	tools	used	to	
stages and elements of a penetration test.
                                                          bypass them
Particpants start with the initial information
                                                       •	 Which tools can be used to leverage access on a
discovery and target scanning through to
                                                          system
exploitation, privilege escalation, and retaining
                                                       •	 How information may be used to assess weak-
access.
                                                          nesses and subsequently launch an attack against
                                                          a target How hackers conceal their tracks and the
The course also explores the usage of various tools
                                                          route through which access to a target may be
common to Ethical hacking and particpants are
                                                          maintained
provided copies of tools to take with them.
                                                       •	 The	implications	of	flawed	web	applications	
                                                          security
Benefits
                                                       •	 How web users are at threat
•	 Participant will learn about the hacker mindset
   and become familiar with the tools used to attack
                                                       Who should attend
   systems
                                                       Those responsible for the security of IT systems,
•	 Participants learn not only how to use tools, but
                                                       including but not limited to: System/Network
   why they use the various tools
                                                       Administrators, Crime Prevention & Protection
•	 Our state of the art class environment covers
                                                       Offices,	Auditors,	Security	Officers,	Information
   Windows and *NIX operating systems and associ-
                                                       Security Professionals & Penetration Testers.
   ated server software
•	 Around 50 hands-on practical exercises are fea-
   tured, using a wide range of hacking tools
Course style                                              Firewall & IDS evasion
                                                          • How attacks may traverse a firewall
This course is hands-on. Participants will actually
                                                          • The role of intrusion detection & how it may be
attempt to hack systems during class as exercises are
                                                              evaded using advanced techniques
ran. Participants will learn how to apply the tools and
                                                          • Hacking prevention
techniques that hackers use.
                                                          • Security policy, system integrity, hardening &
                                                              monitoring
Delivery is in an interactive format with the use of
                                                          • Security tools, vulnerability assessment &
multimedia and practical hands-on workshops. Open
                                                              penetration testing
group discussion is strongly encouraged. The course is
designed to educate for the purpose of properly
                                                          and much more!
Level & Prerequisites
                                                          Duration
A familiarity of TCP/IP and a background in Microsoft
                                                          2 days
Windows and/or UNIX is desirable.

                                                          Cost
Course content highlights
                                                          $500
AN INTrODUCTION TO HACkINg
A history and cultural overview of hacking
Insights into the hacker mindset
Hacker genres

                                                          For more info and to register for a class
COMMUNICATION PrOTOCOL BASICS
Provides a fundamental understanding of
                                                          contact NuOpus at 866-430-9098
communication protocols
An overview of TCP/IP & Networking
An introduction to ports and protocols
Sniffing and intercepting traffic
Man in the middle attacks

HACkINg MeTHODOLOgIeS
A practical exploration of hacking/penetration testing
methods

Information Discovery
• How information about a target may be gathered
    discreetly
• Target profiling
• Using public databases to reveal sensitive
    information
• Social engineering
• Target scanning & system detection
• examining the target landscape
• Operation system detection
• Port scanning to reveal openings in the system

exploitation & Privilege escalation
• How access may be gained & privilege escalated
   to achieve full control of systems

Contenu connexe

Tendances

Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsPeter Wood
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaEdureka!
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismGlobal Micro Solutions
 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar sasikalaD3
 
Sophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent SecuritySophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent SecurityPriyanka Aash
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?festival ICT 2016
 
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersIntroduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersOllie Whitehouse
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseMercury Solutions Limited
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Dan Morrill
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit vArthyR3
 
Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2Mike Miller
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Yuval Sinay, CISSP, C|CISO
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Securityvishnukp34
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationInfocyte
 
SIEM-plifying security monitoring: A different approach to security visibility
SIEM-plifying security monitoring: A different approach to security visibilitySIEM-plifying security monitoring: A different approach to security visibility
SIEM-plifying security monitoring: A different approach to security visibilityAlienVault
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.Rishabh Gupta
 

Tendances (19)

Security Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent ThreatsSecurity Intelligence: Advanced Persistent Threats
Security Intelligence: Advanced Persistent Threats
 
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | EdurekaLearn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
Learn Ethical Hacking in 10 Hours | Ethical Hacking Full Course | Edureka
 
Introduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivismIntroduction to the advanced persistent threat and hactivism
Introduction to the advanced persistent threat and hactivism
 
ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar    ECSA Exam Centre in Adyar
ECSA Exam Centre in Adyar
 
Sophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent SecuritySophisticated Attacks vs. Advanced Persistent Security
Sophisticated Attacks vs. Advanced Persistent Security
 
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
Advanced Persistent Threat: come muoversi tra il marketing e la realtà?
 
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security EngineersIntroduction to Advanced Persistent Threats (APT) for Non-Security Engineers
Introduction to Advanced Persistent Threats (APT) for Non-Security Engineers
 
Know All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) CourseKnow All About Certified Ethical Hacking (CEH v9) Course
Know All About Certified Ethical Hacking (CEH v9) Course
 
Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)Understanding advanced persistent threats (APT)
Understanding advanced persistent threats (APT)
 
Iscsp apt
Iscsp aptIscsp apt
Iscsp apt
 
Advanced persistent threats(APT)
Advanced persistent threats(APT)Advanced persistent threats(APT)
Advanced persistent threats(APT)
 
Cs8792 cns - unit v
Cs8792   cns - unit vCs8792   cns - unit v
Cs8792 cns - unit v
 
CEH
CEHCEH
CEH
 
Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2Mike Miller Resume 2016 - Ver 2
Mike Miller Resume 2016 - Ver 2
 
Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)Common Techniques To Identify Advanced Persistent Threat (APT)
Common Techniques To Identify Advanced Persistent Threat (APT)
 
CS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network SecurityCS8792 - Cryptography and Network Security
CS8792 - Cryptography and Network Security
 
Cyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 PresentationCyber Incident Response Triage - CPX 360 Presentation
Cyber Incident Response Triage - CPX 360 Presentation
 
SIEM-plifying security monitoring: A different approach to security visibility
SIEM-plifying security monitoring: A different approach to security visibilitySIEM-plifying security monitoring: A different approach to security visibility
SIEM-plifying security monitoring: A different approach to security visibility
 
Security protection On banking systems using ethical hacking.
Security protection  On banking systems using  ethical hacking.Security protection  On banking systems using  ethical hacking.
Security protection On banking systems using ethical hacking.
 

Similaire à Ethical Hacking Class

Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxGovandJamalSaeed
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical HackerPiotrPatun
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guidePankaj Dubey
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptxvamshimatangi
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hackingSaqib Raza
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfssuser4237d4
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskBeyondTrust
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxbakhtinasiriav
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfisha bajpai
 
RED-TEAM_Conclave
RED-TEAM_ConclaveRED-TEAM_Conclave
RED-TEAM_ConclaveNSConclave
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopDigit Oktavianto
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical HackingIRJET Journal
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical HackingVinny Vessel
 

Similaire à Ethical Hacking Class (20)

Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptxEthical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
Ethical hacking seminardk fas kjfdhsakjfh askfhksahf.pptx
 
Ethical hacking
Ethical hacking Ethical hacking
Ethical hacking
 
How to become an Ethical Hacker
How to become an Ethical HackerHow to become an Ethical Hacker
How to become an Ethical Hacker
 
Hacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guideHacking and Penetration Testing - a beginners guide
Hacking and Penetration Testing - a beginners guide
 
Ethical Hacking justvamshi .pptx
Ethical Hacking justvamshi          .pptxEthical Hacking justvamshi          .pptx
Ethical Hacking justvamshi .pptx
 
MyResume.pdf
MyResume.pdfMyResume.pdf
MyResume.pdf
 
CEH-brochure.pdf
CEH-brochure.pdfCEH-brochure.pdf
CEH-brochure.pdf
 
Ethical hacking
Ethical hackingEthical hacking
Ethical hacking
 
Internet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wallInternet safety and security strategies for building an internet safety wall
Internet safety and security strategies for building an internet safety wall
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdfCyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
 
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce RiskThe Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
The Hacker Playbook: How to Think like a Cybercriminal to Reduce Risk
 
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptxC4I cyber secuirty by Eric Eifert - Keynote 9.pptx
C4I cyber secuirty by Eric Eifert - Keynote 9.pptx
 
Lesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPSLesson 3- Effectiveness of IDPS
Lesson 3- Effectiveness of IDPS
 
Ethical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdfEthical Hacking Certification Course in Delhi.pdf
Ethical Hacking Certification Course in Delhi.pdf
 
RED-TEAM_Conclave
RED-TEAM_ConclaveRED-TEAM_Conclave
RED-TEAM_Conclave
 
Cyber Threat Hunting Workshop
Cyber Threat Hunting WorkshopCyber Threat Hunting Workshop
Cyber Threat Hunting Workshop
 
IRJET-Ethical Hacking
IRJET-Ethical HackingIRJET-Ethical Hacking
IRJET-Ethical Hacking
 
Vapt life cycle
Vapt life cycleVapt life cycle
Vapt life cycle
 
An Introduction to Ethical Hacking
An Introduction to Ethical HackingAn Introduction to Ethical Hacking
An Introduction to Ethical Hacking
 

Plus de Laney Dale

Continuous Pentration Testing Services
Continuous Pentration Testing ServicesContinuous Pentration Testing Services
Continuous Pentration Testing ServicesLaney Dale
 
Nu Opus Llc Product Overview
Nu Opus Llc Product OverviewNu Opus Llc Product Overview
Nu Opus Llc Product OverviewLaney Dale
 
Gartner Briefing Fed Comp Nu Opus
Gartner Briefing   Fed Comp    Nu OpusGartner Briefing   Fed Comp    Nu Opus
Gartner Briefing Fed Comp Nu OpusLaney Dale
 
Gartner Briefing Simple Compliance Manager Nu Opus
Gartner Briefing   Simple Compliance Manager Nu OpusGartner Briefing   Simple Compliance Manager Nu Opus
Gartner Briefing Simple Compliance Manager Nu OpusLaney Dale
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining SlidesLaney Dale
 
Is IFRS Worth The Cost
Is IFRS Worth The CostIs IFRS Worth The Cost
Is IFRS Worth The CostLaney Dale
 

Plus de Laney Dale (7)

Continuous Pentration Testing Services
Continuous Pentration Testing ServicesContinuous Pentration Testing Services
Continuous Pentration Testing Services
 
Lucy
LucyLucy
Lucy
 
Nu Opus Llc Product Overview
Nu Opus Llc Product OverviewNu Opus Llc Product Overview
Nu Opus Llc Product Overview
 
Gartner Briefing Fed Comp Nu Opus
Gartner Briefing   Fed Comp    Nu OpusGartner Briefing   Fed Comp    Nu Opus
Gartner Briefing Fed Comp Nu Opus
 
Gartner Briefing Simple Compliance Manager Nu Opus
Gartner Briefing   Simple Compliance Manager Nu OpusGartner Briefing   Simple Compliance Manager Nu Opus
Gartner Briefing Simple Compliance Manager Nu Opus
 
Duke Pci T Raining Slides
Duke Pci T Raining SlidesDuke Pci T Raining Slides
Duke Pci T Raining Slides
 
Is IFRS Worth The Cost
Is IFRS Worth The CostIs IFRS Worth The Cost
Is IFRS Worth The Cost
 

Ethical Hacking Class

  • 1. Ethical Hacking for IT Professionals Course Outline NuOpus LLC 761 Airport Rd #107 Chapel Hill, NC 27514 919-975-2500 www.nuopus.com
  • 2. Ethical Hacking for IT Professionals What you will learn The Ethical Hacking for IT Professionals • How to use the tools, techniques and methodolo- provides a foundation in the common gies employed by hackers techniques, tools, methodologies, and • How hackers can accurately collect and assimi- culture of ethical hacking. late information about an organisation’s infra- structure whilst avoiding detection • Measures to secure and protect information against hacker attacks The class takes participants through the various • Limitations of firewalls and the tools used to stages and elements of a penetration test. bypass them Particpants start with the initial information • Which tools can be used to leverage access on a discovery and target scanning through to system exploitation, privilege escalation, and retaining • How information may be used to assess weak- access. nesses and subsequently launch an attack against a target How hackers conceal their tracks and the The course also explores the usage of various tools route through which access to a target may be common to Ethical hacking and particpants are maintained provided copies of tools to take with them. • The implications of flawed web applications security Benefits • How web users are at threat • Participant will learn about the hacker mindset and become familiar with the tools used to attack Who should attend systems Those responsible for the security of IT systems, • Participants learn not only how to use tools, but including but not limited to: System/Network why they use the various tools Administrators, Crime Prevention & Protection • Our state of the art class environment covers Offices, Auditors, Security Officers, Information Windows and *NIX operating systems and associ- Security Professionals & Penetration Testers. ated server software • Around 50 hands-on practical exercises are fea- tured, using a wide range of hacking tools
  • 3. Course style Firewall & IDS evasion • How attacks may traverse a firewall This course is hands-on. Participants will actually • The role of intrusion detection & how it may be attempt to hack systems during class as exercises are evaded using advanced techniques ran. Participants will learn how to apply the tools and • Hacking prevention techniques that hackers use. • Security policy, system integrity, hardening & monitoring Delivery is in an interactive format with the use of • Security tools, vulnerability assessment & multimedia and practical hands-on workshops. Open penetration testing group discussion is strongly encouraged. The course is designed to educate for the purpose of properly and much more! Level & Prerequisites Duration A familiarity of TCP/IP and a background in Microsoft 2 days Windows and/or UNIX is desirable. Cost Course content highlights $500 AN INTrODUCTION TO HACkINg A history and cultural overview of hacking Insights into the hacker mindset Hacker genres For more info and to register for a class COMMUNICATION PrOTOCOL BASICS Provides a fundamental understanding of contact NuOpus at 866-430-9098 communication protocols An overview of TCP/IP & Networking An introduction to ports and protocols Sniffing and intercepting traffic Man in the middle attacks HACkINg MeTHODOLOgIeS A practical exploration of hacking/penetration testing methods Information Discovery • How information about a target may be gathered discreetly • Target profiling • Using public databases to reveal sensitive information • Social engineering • Target scanning & system detection • examining the target landscape • Operation system detection • Port scanning to reveal openings in the system exploitation & Privilege escalation • How access may be gained & privilege escalated to achieve full control of systems