Network Hacking & Defense

Course

In Belfast City

Price on request

Description

  • Type

    Course

  • Location

    Belfast city (Northern Ireland)

  • Duration

    2 Days

By undertaking the course, attendees will: Learn about significant computer network weaknesses. Understand the underlying psychology that motivate hackers. Use the approaches used by hackers to target networks. Conduct local and widea area network penetration and hacking. Apply the latest network defense tools and techniques. Develop robust and comprehensive network security policies. Suitable for: This training course is suitable for IT professionals who need to learn about significant network insecurities and how to manage them. It will be of special benefit to those responsible for implementation and administration of their organization's computer network security.

Facilities

Location

Start date

Belfast City (County Antrim)
See map
Po Box 672, BT7 1DJ

Start date

On request

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Network

Course programme

Course Objectives

The 'Network Hacking & Defense' course deals comprehensively with significant computer network security issues. It provides attendees with practical, hands-on experience of major risks exisiting in networked systems as well as in-depth knowledge of how these insecurities can be mitigated through implementation of specific procedures, tools and techniques

By undertaking the course, attendees will:

* Learn about significant computer network weaknesses
* Understand the underlying psychology that motivate hackers
* Use the approaches used by hackers to target networks
* Conduct local and widea area network penetration and hacking
* Apply the latest network defense tools and techniques
* Develop robust and comprehensive network security policies

Who Should Attend

This training course is suitable for IT professionals who need to learn about significant network insecurities and how to manage them. It will be of special benefit to those responsible for implementation and administration of their organization's computer network security.

Assumed Knowledge

Course delegates should have elementary knowledge of computer networking and experience in use of Internet-based technologies.

Course Outline

1. Hacking Background

* Existing Scope
o Categories
o Targets
o Tools

* Hacker Psychology
o Common Profile
o Motivation

* Hacking Approaches
o Essentials
o Brute Force
o Stealth
o Social Engineering

2. Network Targeting

* Foot Printing Organizations
o Organization Details
o IP Address Range
o Application Servers
o Domain Name System (DNS) Zone File Access

*Enumerating Networks & Live Hosts

o ICMP / TCP / UDP Sweeps
o Full-Connect & Stealth Scans

*Profiling Networked Systems

o Operating System Fingerprinting
o Server Software Identification

o User / Group Identification

3. Wide Area Network Hacking

* Spoofing Techniques:
o IP address
o DNS Servers
o Web Sites

* Denial-of-Service Attacks
o Bandwidth Consumption
o Router Disruptions
o Server Crashing

*Network Breaching

o TCP/IP Fragmentation
o FTP Bounce
o Buffer Overflow Exploits
o Exploiting Network Accessible Shares
o ICMP Misinformation

*Network Flooding

o UDP Flood
o TCP SYN Flood
o Ping / Smurf Flood

4. Local Area Network Hacking

* Virus & Trojan Horse Attacks
o Infection Sources
o Control Methods

*Blinding Firewalls

o Opaque Transfers
o Rule Bending

* Passive Stealth Attacks
o Sniffer Infiltration
o Spyware Invasion

5. Network Hacking Defense

* Mitigating Denial-of-Service Attacks
o Traffic Filtering
o Bandwidth Defense
o Load Balancing

* Applying Encryption Protocols
o SSL
o IPSEC
o DNSSEC

*Deploying Firewalls

o Firewall Organizations
+ Single Layer
+ Multi-Layer
+ Sub-Netting
o Auditing Firewall
o Penetration Testing

*Scanning For Vulnerabilities

o Discovering NETBIOS & SNMP Access
o Checking Router Mis-Configurations
o Identifying System Software Bugs
o Locating Invasive Software

* Using Intrusion Detection Systems
o Network & Host Based Detection Techniques
o Honeypot Applications - Identifying & Disabling Attackers

*Maintaining Log File Integrity

o Local & Remote Logging
o Remote Log Server Setup

* Developing Network Security Policy
o Site Access
o Network Access
o Firewall Design
o Incident Handling
o Disaster Recovery

Network Hacking & Defense

Price on request