Learn: in:
» back to Search Results

Course rating of 0 Vendor rating of 5


Our course is developed based on principles and methods used by malicious hackers, but its focus is professional penetration testing and securing information assets.


 
Course Outline
Module 1 - Business and Technical Logistics for Pen Testing
Definition of a Penetration Test
The Evolving Threat
Security Vulnerability Life Cycle
Exploit Timeline
What You May Not Have Known…
Zombie Statistics
Demo: Zombie Statistics
Zombie Definition
Botnet Definition
Defense in Depth
Types of Penetration Testing
Pen Test Methodology
Hacker vs. Penetration Tester
Methodology for Penetration Testing / Ethical Hacking
Tools vs. Technique
Penetration Testing Methodologies
Demo: Resouces on Penetration Methodologies
Demo: FFIEC
OSSTMM - Open Source Security Testing Methodologies
Website Review
Demo: Cybercrime and Computer World Websites
Website Review
Demo: SC Magazine
Module 1 - Lab
Case Study and Lab
Module 1 Review
Module 2 - Reconnaissance: Information Gathering
What Information is Gathered by the Hacker
Methods of Obtaining Information
Physical Access
Demo: Bump Key Technique
Social Access
Demo: Social Engineering with Kevin Rose
Digital Access
Passive vs. Active Reconnaissance
Footprinting Defined
Footprinting Tool: Kartoo Website
Footprinting tools
Google and Query Operators
Google (cont.)
Johnny.Ihackstuff.com
Site Digger 2.0
Internet Archive: The WayBack Machine
Domain Name Registration
WHOIS
WHOIS Output
DNS Databases
Using Nslookup
Dig for Unix / Linux
Traceroute Operation
Traceroute (cont.)
EDGAR For USA Company Info
Company House For British Company Info
People Search Tool
Google Earth
Intelius info and Background Check Tool
Web Server Info Tool: Netcraft
Countermeasure: Domainsbyproxy.com
Footprinting Countermeasures
Case Study and Lab
Module 2 Review
Module 3 - Linux Fundamentals
Linux History – Linus + Minix = Linux
The GNU Operating System
Linux Introduction
Linux GUI Desktops
Linux Shell
Linux Bash Shell
Recommended Linux Book
Password & Shadow File FormatsUser Account Management
Instructor Demonstration
Changing a user account password
Demo: BackTrack
Configuring Network Interfaces with Linux
Demo: Setting up a Network Interface
Mounting Drives with Linux
Demo: Mounting a Drive
Tarballs and Zips
Compiling Programs in Linux
Demo: Compile and Run an Application
Typical Linux Operating System’s
Gentoo = Simple Software Install Portal
Demo: Operating System's
Demo: VLOS
Why Use Live Linux Boot CD’s
Security Live Linux CD’s
FrozenTech’s Complete Distro List
Most Popular: BackTrack
Demo: Troubleshooting BackTrack
My Slax Creator
Slax Modules (Software Packages)
Module 3 - Lab
Case Study and Lab
Module 3 Review
Module 4 - Reconnaissance: Detecting Live Systems
Introduction to Port Scanning
Port Scan Tips
Ping
Demo: Packetyzer
The TCP/IP stack
Which services use which ports?
TCP 3-Way Handshake
Demo: Creating Custom Packets
TCP Flags
Vanilla (TCP Connect Port Scan)
NMAP TCP Connect Scan
Demo: NMAP
NMAP
Half-open Scan
Tool Practice : TCP half-open & Ping Scan
Firewalled Ports
NMAP Service Version Detection
UDP Port Scan
Popular Port Scanning Tools
Tool: Superscan
Tool: LookatLan
Tool: Hping2 – BackTrack Distro
Tool Practice: Hping2
Demo: Look@Lan
Demo: Hping2
Tool: Auto Scan
Demo: Auto Scan
Advanced Port Scanning / Packet Crafting
OS Fingerprinting
OS Fingerprinting: Xprobe2 – Auditor Distro
What Is Fuzzy Logic?
Tool: P0f – Passive OS Finger Printing Utility
Tool Practice: Amap
Packet Crafting
Demo: OS Finger Printing
Tool Fragrouter: Fragmenting Probe Packets
Countermeasures: Scanning
Scanning Tools Summary
Module 4 - Lab
Case Study and Lab
Module 4 Review
Module 5 - Reconnaissance: Enumeration
Web Server Banners
Practice: Banner Grabbing with Telnet
Web Server Banners (cont.)
SMTP Server Banner
Demo: Server Banners
Demo: Sam Spade
Demo: Netcat
DNS Enumeration
Zone Transfers from Windows 2000 DNS
Demo: DNS Enumeration
Countermeasure: DNS Zone Transfers
SNMP Insecurity
SNMP Enumeration
SNMP Enumeration Countermeasures
Demo: SNMP Techniques
Active Directory Enumeration
AD Enumeration countermeasures
Null sessions
Syntax for a Null Session
Viewing Shares
Demo: Null Session
Tool: DumpSec
Tool: USE42
Tool: Enumeration with Cain and Abel
Null Session Countermeasures
Enumeration Tools Summary
Module 5 - Lab
Case Study and Lab
Module 5 Review
Module 6 - Cryptography: Decrypting the Cipher
Introduction
Demo: CrypTool
Encryption
Implementation
Symmetric Encryption Symmetric Algorithms
Crack Times
Asymmetric Encryption
Key Exchange
Key Exchange Demo
Hashing
Demo: Hashing
Hash Collisions
Common Hash Algorithms
Hybrid Encryption
Digital Signatures
SSL Hybrid Encryption
IPSec
Demo: IPSec IPSec
Public Key Infrastructure
PKI-Enabled Applications
Attack Vectors
Module 6 - Lab
Case Study and Lab
Module 6 Review
Module 7 - Vulnerability Assessments
Assessment Intro
Technical Cyber Security Alerts
Demo: Cert.org
Open Source Assessments Tools
Tool: Nessus Open Source
Nessus Plugins
Scanning the Network
Demo: Whax Demo: Core Security
Tool: X-Scan
Commercial vulnerability Scanners
Tool: Retina
Tool: NewT
Tool: LANguard
Analyzing the Scan Results
Demo: LANguard Tool: Core Impact
Microsoft Baseline Analyzer
Demo: Nessus 3 MBSA Scan Report
Demo: Baseline Security Analyzer
Patch Management
Patching with LANguard Network Security Scanner
Case Study and Lab
Module 7 Review
Module 8 - Windows Hacking: Staying Ahead of the Hacker
Keystroke Loggers
Password Cracking
Demo: Password Cracking
Rainbow Table
Authentication Procedure
Password Sniffing Privilege Escalation
Password Hash Insertion
Demo: PWRESET2
Demo: Booting from BackTrack
Countermeasures
More Countermeasures
Multi-Factor Authentication
Smart Cards
Evading The Event Logs
Disable Auditing
Clearing the Event Log
Alternate Data Streams Demo: Alternate Data Streams Steganography – In Clear Sight
Demo: Methods to hide Data
RootKits
Demo: Rootkits
RootKit Detection
Case Study and Lab
Module 8 Review
Module 9 - Advanced Exploit Techniques
How Do Exploits Work?
Memory Organization
Buffer OverFlows
Heap Overflows
Stages Of Exploit Development Prevention
Demo: Stack Function
TCP/IP OSI Exploits
The Metasploit Project
The Alien Shore
The Metasploit Project
Demo: The Metasploit Project Core Impact Overview
Core Impact
Demo: Core Impact Case Study and Lab
Module 9 Review
Module 10 - Malware: Software Goes Undercover
Defining Malware: Trojans and backdoors
Defining Malware: Virus & Worms
Defining Malware: Spyware
Malware Distribution Methods
Hacker Uses of Malware
Malware Privilege Level
Autostart Methods
Countermeasure: Monitoring Autostart Methods
Tool: Netcat
Netcat Switches
Demo: Netcat Remote Access Trojan Components
Executable Wrappers
Benign EXEs Historically Wrapped With Trojans
Demo: Executable Wrappers
Tool: Restorator
Tool: Exe Icon
The Infectious CD-ROM Technique
Advanced Trojans: Beast
Advanced Trojans: Avoiding Detection
Overview of Malware Countermeasures
CM Tool: Anti-Spyware Software
CM Tool: Anti-Trojan Scanners
Malware Reference: www.Glocksoft.com
CM Tool: Port Monitoring Software
CM Tool: File Protection Software
CM Tool: Windows File Protection
CM Tool: Windows Software Restriction Policies
CM Tool: Hardware-based Malware Detectors
Countermeasure: User Education
Module 10 Review
Module 11 - Attacking Wireless Networks: Securing the Air
Wi-Fi Network Types Widely Deployed Standard’s
A vs B vs G
802.11n - MIMO
SSID (Service Set Identity)
MAC Filtering
Wired Equivalent Privacy
Weak IV Packets
XOR - Basics
WEP Weaknesses
TKIP
How WPA improves on WEP The WPA MIC Vulnerability
802.11i - WPA2
WPA and WPA2 Mode Types
WPA-PSK Encryption
Tool: NetStumbler
Demo:NetStumbler
Tool: Kismet
Analysis Tool: AiroPeek
Tool: Aircrack
DOS: Deauth/disassociate attack
DoS: VOID 11
Tool: Aireplay
ARP Injection (Failure)
ARP Injection (Success)
802.1X: EAP Types
EAP Advantages/Disadvantages
Typical Wired/Wireless Network
Module 11 Review
Module 12 - Networks, Sniffing and IDS: Intercept and Redirect!
Packet Sniffers
Example Packet Sniffers
Tool: Pcap & WinPcap
Tool: Wireshark (Ethereal)
TCP Stream Re-assembling
Tool: Packetyzer
tcpdump & windump
Tool: OmniPeek
Demo: Wireshark Analyzer Sniffer Detection
Passive Sniffing
Demo: Passive Sniffing
Active Sniffing
Active Sniffing Methods
Switch Table Flooding
ARP Cache Poisoning
ARP Normal Operation
ARP Cache Poisoning
Technique: ARP Cache Poisoning (Linux)
Countermeasures
Tool: Cain and Abel
Demo: Cain and Abel
Ettercap
Linux Tool Set:Dsniff Suite
Dsniff Operation
MailSnarf, MsgSnarf, FileSnarf
What is DNS spoofing?
Demo: DNS spoofing
Tools: DNS Spoofing
Breaking SSL Traffic
Tool: Breaking SSL Traffic
Tool: Cain and Abel
Demo:Cain and Abel
Voice over IP (VoIP)
Intercepting VoIP
Intercepting RDP
Cracking RDP Encryption
Demo: Wireless Phone
Routing Manipulation Methods
Countermeasures for Sniffing Firewalls, IDS and IPS
Firewall – First line of defense
IDS – Second line of defense
Evading The Firewall and IDS
Evasive Techniques
Firewall – Normal Operation
Evasive Technique -Example
Demo: Engage Packet Builder
Evading With Encrypted Tunnels
Demo: Tunnel Configuration
‘New Age’ Protection
SpySnare - Spyware Prevention System (SPS)
Intrusion ‘SecureHost’ Overview
Intrusion Prevention Overview
Secure Surfing or Hacking ????
Case Study and Lab
Module 12 Review
Module 13 - Injecting the Database Injecting the Database
Overview of Database Server
Types of databases
Overview of Database Server Relational Databases
Overview of Database Server
Vulnerabilities and Common Attacks
SQL Injection
Why SQL “Injection”? SQL Connection Properties
SQL Injection: Enumeration SQL Extended Stored Procedures Demo: SQL Injection Shutting Down SQL Server
Direct Attacks
Attacking Database Servers
Obtaining Sensitive Information
Hacking Tool: SQL Ping2
Hacking Tool: osql.exe
Hacking Tool: Query Analyzers
Hacking Tool: SQLExec
Hacking Tool: Metasploit
Hardening Databases >Module 13 - Case Study and Lab Module 13 Review
Module 14 - Attacking Web Technologies
Common Security Threats
The Need for Monitoring
Seven Management Errors
Progression of The Professional Hacker
The Anatomy of a Web Application Attack
Demo: The Anatomy of a Web Application Attack Attacks against IIS
ISAPI DLL Source disclosures
ISAPI.DLL Exploit
IIS Directory Traversal
Unicode
IIS Logs
Protection against Buffer Overflows
Assessment Tool: Stealth HTTP Scanner
Common Web Application Vulnerabilities
Components of a generic web application system
URL mappings to the web application system
Web Application Penetration Methodologies
Tool: Paros Proxy
Tool: Burp Proxy
Tool: Lynx
Tools: Black Widow And WGET
What is Cross Side Scripting (XSS)?
XSS Countermeasures
Authentication
Tool: Brutus
Dictionary Maker
Query String
Cookies
OWASP Top Ten Web Vulnerabilities
Module 14 - Lab Case Study and Lab
Module 14 Review
Prerequisites & Certificates
Pre-Requisites

Certificates offered


Cancellation Policy
Cancellations or postponements received more than ten business days prior to the first day of the course will be fully refunded less a $75 processing fee. The cost of the course is payable, in full, for any cancellations or postponements received within ten business days, or less, prior to the first day of the course.
Map & Reviews
Acend Corporate Learning
[ View Provider's Profile ]

Reviews
 

This course has not yet been rated by one of our members.

If you have taken a course through this vendor please log into your account and leave feedback for this vendor. You will be helping ensure our members get directed to the best training facilities.

Here are some reviews of the training vendor.
The course content was excellent ... if there was things that weren't relevant you could skip and spend more time on things that you needed to learn. Training provider was excellent as her skill level was superb and her communication skills were superb.
Reviewed by 2015
This course should have dual screens
Reviewed by 2015
I was not able to finish the whole entire course. When creating course training please make sure that it fits the allotted time (beginning to the end). We had two breaks and Instructor did not allow us to listen to the course. I had maybe another 10 mins to finish the whole course, but the Instructor said that it was 4:30pm and it is Ok and we can go home. It is not Ok not to be able to finish the course..
Reviewed by 2014
Mentored training actually worked quite well for me. The instructor is there in the room all the time, available if needed. A lot of material for one day, but I did manage to complete it without feeling too rushed.
Reviewed by 2014
It is not possible to complete a beginner's course in one day. There is a lot of information to absorb. It is wonderful that one can re-sit a session within a limited time.
Reviewed by 2013
To bottom line my feelings about the course: Course -- helpful but this comment is made with reservations. Instructor -- excellent !
Reviewed by 2013
The course material was far too heavy for the duration of the course. The material needs to be reduced so that students do not feel rushed or pressured with time, or the duration of the class needs to be extended.
Reviewed by 2013
Overall, the course has been well handled by the Training Provider. But i would expect that, somehow, there is a time allotted in the afternoon for more visible and face to face interaction between the TP and the whole class. Others may be asking questions that may not have been thought of by other learners but may be helpful.
Reviewed by 2013
Very impressed and would highly recommend.
Reviewed by 2013
The trainer was excellent...easy to talk to and very helpful and informed.
Reviewed by 2013
This was a very good learning environment. I prefer having an instructor present in case I have questions but also be able to work at my own pace.
Reviewed by 2013
I could have used some more time to go through the exercises in the sharepoint database.
Reviewed by 2013
re Instructor assessment. ques. are N/A as it was independant mentored study. Flash based training module had 1 hiccup where ctrl-b key was captured by OS and I had to hunt for alt-b to complete the module. Class mentor was unaware of flaw. I felt that the design of the module would have prevented me from completing the section if I was unable to locate alternative keystroke. Worthwhile day.
Reviewed by 2012
Course is very good but not enough time to complete the exercises. Should be at least another 1.5 hours longer.
Reviewed by 2012
Using the self-teaching method made for a more relaxed working environment. As the instructor's assistance was on a one-on-one basis I was not hesitate to ask questions.
Reviewed by 2012
Would prefer an instructor led (classroom) style of training over a computer based course.
Reviewed by 2012
I would suggest that the course manual contain more visual material (e.g. screen shots) versus words. The course was very well. I did not think I would like the on line method of training but I did. I also liked the fact that I could work through my lunch to complete the course earlier. I had to catch the go train so it worked better for me.
Reviewed by 2012
Susan was an excellent instructor, and was very helpful with providing extra "tips" not covered within the course material.
Reviewed by 2012
I only realized after completing 2 units thoroughly that there is not enough time allotted for a lot practicing. I would tell students in advance that getting through the videos and practicing later in your own time is recommended.
Reviewed by 2012
Enjoyed the flexibility of the "Modern Classroom" style of learning where you can move at your own pace and focus on what you need most. You can even move to the next chapter if you need help and the instructor is busy. Definitely dress warmly as the classroom was really over air-conditioned!
Reviewed by 2012
I loved the Adobe InDesign course but as a new user I felt there was so much material to cover and I wanted to take my time getting familiar with the program and learning about everything. I think if the class had been 2 days instead of 1 it would have been perfect!
Reviewed by 2012
Manual provided was totally different then computer training. Expected more hands on training instead of just watching an instruction video.
Reviewed by 2012
Great
Reviewed by 2012
The video - was not at all interactive - only concepts were presented. The manual completedly different from the video material. I have no objections to using different approaches but a course on any software must include interactive materials.
Reviewed by 2012
The course was set up in a way which was easy to follow. However, I thought there was a lot of information to take in the day. The instructor was very helpful and very knowledgeable.
Reviewed by 2012
The training provider, Melanie, was exceptional. She was very knowledgeable and sat with me personally for hands on training. I found the course to be long and difficult to complete in one day.
Reviewed by 2012
The amount of material was a little much (maybe an hour) to cover in the allotted time - but otherwise good.
Reviewed by 2011
The room was too cold for me. The Instructor was very helpful.
Reviewed by 2011
A co worker of mine, did not receive the certificate of completing the course. As well, I received a website to log to after the course for 30 days (The Online Support). Although the vendor ID number does not exisit. I have gone back to my contact at Last Minute Training, and haven't received any feedback from her. The course was good, the follow up, was the greatest service.
Reviewed by 2011
Would like to have access to the on-line training materials for this course for a period of time after course completion
Reviewed by 2011
Hi - the server crashed during my session and I would like to reschedule. Can someone contact me to do this?
Reviewed by 2011
need-to-train-a-group-banner

This course currently does not have any dates scheduled. Please call 1-877-313-8881 to enquire about future dates or scheduling a private, in house course for your team.

This page has been viewed 400 times.