Applied Networking III
Learning Outcomes
At the end of this course, students will be able to: Explain the platform used and principles of penetration test; Demonstrate how to sniff, scan, perform system hack; Demonstrate web server, web application and wireless hacking; Explain phishing, DOS, Social engineering and priviledge escalation; Explain how to maintain access, evade network security devices, to document and report.
Topics
- Introduction to Ethical Hacking
- Platform – Backtrack
- Network and Computer Attacks.
- Penetration Testing
- Planning – Target Scoping
- Information Gathering
- Target Discovery
- Footprinting
- Enumeration
- Vulnerability Mapping
- Sniffers
- Scanning
- Target Exploitation
- System Hacking
- Operating Systems Vulnerabilities.
- Hacking Web Servers
- Web Application Vulnerabilities
- Hacking Wireless Networks
- Phishing
- Hijacking
- Denial-of-Service
- Social Engineering
- Privilege Escalation
- Maintaining Access
- Security Devices.
- Documentation and Reporting
SOCIAL MEDIA
Let’s relentlessly connected and get caught up each other.
Looking for tweets ...