This course covers the most common methods used in computer and network hacking with the intention of learning how to better protect systems from such intrusions. These methods include reconnaissance techniques, system scanning, accessing systems by network and application level attacks, and denial of service attacks.
Note: During the course students will complete many hands on exercises.
....... Coming Soon
o| Understand the approaches used today by computer attackers.
o| Provide an understanding of the phases and techniques for public and open source reconnaissance techniques.
o| Understand the offensive and defensive techniques of computer attacks.
o| Gain solid knowledge in buffer overflow concepts and the ability to exploit, and defend against them.
o| Provide detailed understanding of password cracking techniques.
o| Demonstrate a comprehensive understanding of the different kinds of Denial of Service attacks and how to defend against them.
o| Provide hands-on labs addressing scanning, exploiting, and defending systems.
> Basic understanding of networks and network protocols
> Operating Systems concepts
> Basic knowledge about programming languages
>Basic knowledge about information security
Linux system with VirtualBox running the following VMs:
> Different Windows systems XP, 2003, and 7.
> KALI/BackTrack Linux system.
> Metasploitable2 Linux system.