Ethical Hacking & Countermeasures & Workshop

ICTD International Centre for Training and Development

ICTD International Centre for Training and Development

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

The modern world of security systems is changing rapidly, and these days cybersecurity has become one of the most essential parts of protecting data s...

Read more about Finance

Finance is an integral and most important component of any business, so everyone needs to improve their competence in this area. Finance courses will ...

Read more about Human Capital Management

In the rapidly changing global marketplace, companies that consider Human Resources as purely business-serving are inevitably falling behind. That is ...

Who should attend

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

About the course

This course will immerse the participants into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Participants then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Course Objectives

  • Explain accepted data warehouse terminology
  • Explain the goals of data warehousing
  • Identify the stages of the data warehousing lifecycle
  • Apply the star schema model to a business case problem
  • De-normalize relational tables into high level summary tables
  • Design and Implement a multi-dimensional data cube using SQL Server Analysis Services

## Course Outline Introduction to Ethical Hacking Internet is Integral Part of Business and Personal Life - What Happens Online in 60 Seconds

Information Security Overview

  • Year of the Mega Breach
  • Data Breach Statistics
  • Malware Trends in 2014
  • Essential Terminology
  • Elements of Information Security
  • The Security, Functionality, and Usability Triangle

Information Security Threats and Attack Vectors

  • Motives, Goals, and Objectives of Information Security Attacks
  • Top Information Security Attack Vectors
  • Information Security Threat Categories
  • Types of Attacks on a System
  • Operating System Attacks
  • Examples of OS Vulnerabilities
  • Misconfiguration Attacks
  • Application-Level Attacks
  • Examples of Application-Level Attacks
  • Shrink Wrap Code Attacks
  • Information Warfare

Hacking Concepts, Types, and Phases

  • What is Hacking
  • Who is a Hacker?
  • Hacker Classes
  • Hacking Phases
  • Reconnaissance
  • Scanning
  • Gaining Access
  • Maintaining Access
  • Clearing Tracks

Ethical Hacking Concepts and Scope

  • What is Ethical Hacking?
  • Why Ethical Hacking is Necessary
  • Scope and Limitations of Ethical Hacking
  • Skills of an Ethical Hacker

Information Security Controls

  • Information Assurance (IA)
  • Information Security Management Program
  • Threat Modeling
  • Enterprise Information Security Architecture (EISA)
  • Network Security Zoning
  • Defense in Depth
  • Information Security Policies

Types of Security Policies

  • Examples of Security Policies
  • Privacy Policies at Workplace
  • Steps to Create and Implement Security Policies
  • HR/Legal Implications of Security Policy Enforcement

Physical Security

  • Physical Security Controls

Incident Management

  • Incident Management Process
  • Responsibilities of an Incident Response Team

What is Vulnerability Assessment?

  • Types of Vulnerability Assessment
  • Network Vulnerability Assessment Methodology
  • Vulnerability Research
  • Vulnerability Research Websites

Penetration Testing

  • Why Penetration Testing
  • Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
  • Blue Teaming/Red Teaming
  • Types of Penetration Testing
  • Phases of Penetration Testing
  • Security Testing Methodology
  • Penetration Testing Methodology

Information Security Laws and Standards

  • Payment Card Industry Data Security Standard (PCI-DSS)
  • ISO/IEC 27001:2013
  • Health Insurance Portability and Accountability Act (HIPAA)
  • Sarbanes Oxley Act (SOX)
  • The Digital Millennium Copyright Act (DMCA) and Federal Information Security Management Act (FISMA)
  • Cyber Law in Different Countries

Course Methodology

A variety of methodologies will be used during the course that includes:

  • (30%) Based on Case Studies
  • (30%) Techniques
  • (30%) Role Play
  • (10%) Concepts
  • Pre-test and Post-test
  • Variety of Learning Methods
  • Lectures
  • Case Studies and Self Questionaires
  • Group Work
  • Discussion
  • Presentation

Videos and materials

Ethical Hacking & Countermeasures & Workshop at ICTD International Centre for Training and Development

This course has no confirmed dates in the future. Subscribe to be notified when it is offered.


Something went wrong. We're trying to fix this error.

Thank you

Someone from the Coursalytics team will be in touch with you soon.

Disclaimer

Coursalytics is an independent platform to find, compare, and book executive courses. Coursalytics is not endorsed by, sponsored by, or otherwise affiliated with any business school or university.

Full disclaimer.

Read more about Cybersecurity

Сybersecurity courses offer an excellent opportunity to develop the knowledge and skills necessary to implement a perfect cybersecurity strategy that will accelerate the main security protocols' efficiency. After the successful completion of cybersec...

Read more about Finance

During Finance courses, you will get acquainted with a huge number of financial analyst tools and learn how to work with them. So, you will learn how to make and analyze financial reporting, calculate the main financial indicators of the company and ...

Read more about Human Capital Management

Basically, HR management can be defined as the effective use of human resources in an organization with the help of various management strategies. Due to the diversity of the courses, you should be aware of your needs while selecting one. Human Capit...

Because of COVID-19, many providers are cancelling or postponing in-person programs or providing online participation options.

We are happy to help you find a suitable online alternative.