Network Hacking & Defense
Course
In Belfast City
Description
-
Type
Course
-
Location
Belfast city (Northern Ireland)
-
Duration
2 Days
By undertaking the course, attendees will: Learn about significant computer network weaknesses. Understand the underlying psychology that motivate hackers. Use the approaches used by hackers to target networks. Conduct local and widea area network penetration and hacking. Apply the latest network defense tools and techniques. Develop robust and comprehensive network security policies. Suitable for: This training course is suitable for IT professionals who need to learn about significant network insecurities and how to manage them. It will be of special benefit to those responsible for implementation and administration of their organization's computer network security.
Facilities
Location
Start date
Start date
Reviews
Subjects
- Network
Course programme
Course Objectives
The 'Network Hacking & Defense' course deals comprehensively with significant computer network security issues. It provides attendees with practical, hands-on experience of major risks exisiting in networked systems as well as in-depth knowledge of how these insecurities can be mitigated through implementation of specific procedures, tools and techniques
By undertaking the course, attendees will:
* Learn about significant computer network weaknesses
* Understand the underlying psychology that motivate hackers
* Use the approaches used by hackers to target networks
* Conduct local and widea area network penetration and hacking
* Apply the latest network defense tools and techniques
* Develop robust and comprehensive network security policies
Who Should Attend
This training course is suitable for IT professionals who need to learn about significant network insecurities and how to manage them. It will be of special benefit to those responsible for implementation and administration of their organization's computer network security.
Assumed Knowledge
Course delegates should have elementary knowledge of computer networking and experience in use of Internet-based technologies.
Course Outline
1. Hacking Background
* Existing Scope
o Categories
o Targets
o Tools
* Hacker Psychology
o Common Profile
o Motivation
* Hacking Approaches
o Essentials
o Brute Force
o Stealth
o Social Engineering
2. Network Targeting
* Foot Printing Organizations
o Organization Details
o IP Address Range
o Application Servers
o Domain Name System (DNS) Zone File Access
*Enumerating Networks & Live Hosts
o ICMP / TCP / UDP Sweeps
o Full-Connect & Stealth Scans
*Profiling Networked Systems
o Operating System Fingerprinting
o Server Software Identification
o User / Group Identification
3. Wide Area Network Hacking
* Spoofing Techniques:
o IP address
o DNS Servers
o Web Sites
* Denial-of-Service Attacks
o Bandwidth Consumption
o Router Disruptions
o Server Crashing
*Network Breaching
o TCP/IP Fragmentation
o FTP Bounce
o Buffer Overflow Exploits
o Exploiting Network Accessible Shares
o ICMP Misinformation
*Network Flooding
o UDP Flood
o TCP SYN Flood
o Ping / Smurf Flood
4. Local Area Network Hacking
* Virus & Trojan Horse Attacks
o Infection Sources
o Control Methods
*Blinding Firewalls
o Opaque Transfers
o Rule Bending
* Passive Stealth Attacks
o Sniffer Infiltration
o Spyware Invasion
5. Network Hacking Defense
* Mitigating Denial-of-Service Attacks
o Traffic Filtering
o Bandwidth Defense
o Load Balancing
* Applying Encryption Protocols
o SSL
o IPSEC
o DNSSEC
*Deploying Firewalls
o Firewall Organizations
+ Single Layer
+ Multi-Layer
+ Sub-Netting
o Auditing Firewall
o Penetration Testing
*Scanning For Vulnerabilities
o Discovering NETBIOS & SNMP Access
o Checking Router Mis-Configurations
o Identifying System Software Bugs
o Locating Invasive Software
* Using Intrusion Detection Systems
o Network & Host Based Detection Techniques
o Honeypot Applications - Identifying & Disabling Attackers
*Maintaining Log File Integrity
o Local & Remote Logging
o Remote Log Server Setup
* Developing Network Security Policy
o Site Access
o Network Access
o Firewall Design
o Incident Handling
o Disaster Recovery
Network Hacking & Defense