Computer Security and Penetration Testing
The purpose of this course is to give our students of all backgrounds and experience levels a well-researched and engaging introduction to the realm of network security. With real-world examples that reflect today’s most important and relevant security topics, this course addresses how and why people attack computers and networks, so that students can be armed with the knowledge and techniques to successfully combat hackers. Because the world of information security changes so quickly and is often the subject of much hype, this course also aims to provide a clear differentiation between hacking myths and hacking facts. Many hands-on exercises are included, which allow students to practice skills as they are learned.

Chapter 1 : Ethics of Hacking and Cracking
- Understand how the act of unethical computer hacking is a crime
- Classify and identify groups and classes of hackers
- Distinguish the rationale for various types of hackers
- Understand and determine differences in information warfare
- Understand how computer hacking originated and its evolution
- Recognize the importance of ethical hacking and the issues involved in hacker ethics
45min.
Chapter 2 : Reconnaissance
- Identify various techniques for performing reconnaissance
- Distinguish and discuss the methods used in social engineering
- Discuss the importance of dumpster diving in reconnaissance
- Identify a variety of phases of Internet footprinting
1hr. 10min.
Chapter 3 : Scanning Tools
- Comprehend the functioning of scanners
- Trace the development of scanners
- Identify various types of scanning
- Identify different scanners
2hrs. 27min.
Chapter 4 : Sniffers
- Identify sniffers
- Recognize types of sniffers
- Discover the workings of sniffers
- Appreciate the functions that sniffers use on a network
- List types of sniffer programs
- Implement methods used in spotting sniffers
- List the techniques used to protect networks from sniffers
2hrs 1min.
Chapter 5 : TCP/IP Vulnerabilities
- Give a definition of TCP/IP
- Know the steps of TCP/IP communication
- Recognize weaknesses in TCP/IP
- Identify steps in protecting information from vulnerabilities in TCP/IP
1hr. 35min.
Chapter 6 : Encryption and Password Cracking
- Understand basic cryptographic principles
- Understand the fundamentals of encryption
- Describe the most common ciphers in use today
- Identify the most common attacks on passwords
1hr. 35min.
Chapter 7 : Spoofing
- Understand the mechanics of spoofing
- Describe the consequences of spoofing
- Define various types of spoofing
- List and describe some spoofing tools
Learn how to defend against spoofing
1hr. 35min.
Chapter 8 : Session Hijacking
- Define session hijacking
- Understand what session hijacking entails
- Identify the styles of session hijacking
- List some session-hijacking tools
- Explain the differences between TCP and UDP hijacking
- Note measures that defend against session hijacking
1hr. 35min.
Chapter 9 : Hacking Network Devices
- Identify the vulnerabilities of proxy servers
- Identify the vulnerabilities of routers and switches
- Identify the vulnerabilities of firewalls
- Identify the vulnerabilities of virtual private networks (VPNs)
1hr. 35min.
Chapter 10 : Trogan Horses
- Outline the evolution of the Trojan horse
- Name ways in which Trojans are deployed
- Identify risks associated with Trojans
- Name some well-known Trojans
- List Trojan attack prevention measures
- List Trojan detection tools
1hr. 35min.
Chapter 11 : Denial-of-Service Attacks
- Define a denial-of-service (DoS) attack
- Describe causes of DoS attacks
- Describe several varieties of DoS attacks
- Define a distributed denial-of-service (DDoS) attack
- Discuss some known DoS and DDoS attacks
- Describe ways to prevent DoS and DDoS attacks
1hr. 35min.
Chapter 12 : Buffer Overflows
- Describe buffer overflow
- List types of buffer overflows
- Identify techniques used to cause a buffer overflow
- Comprehend techniques used to detect buffer overflow conditions
- Understand methods used in preventing buffer overflows
- Describe buffer overflow
- List types of buffer overflows
- Identify techniques used to cause a buffer overflow
- Comprehend techniques used to detect buffer overflow conditions
- Understand methods used in preventing buffer overflows
1hr. 35min.
Chapter 13 : Programming Exploits
- Describe the evolution of programming exploits
- Recognize vulnerabilities in ActiveX controls
- Identify steps to counter vulnerabilities in ActiveX controls
- Recognize vulnerabilities in VBScript
- Identify steps to counter vulnerabilities in VBScript
- Recognize vulnerabilities in HTML
- Identify steps to counter vulnerabilities in HTML
- Recognize vulnerabilities in Java and JavaScript
- Identify steps to counter vulnerabilities in Java and JavaScript
1hr. 35min.
Chapter 14 : Mail Vulnerabilities
- Define SMTP vulnerabilities
- Outline IMAP vulnerabilities
- Explain POP vulnerabilities
- Identify some specific server application vulnerabilities
- Lists types of e-mail-related attacks
- Identify some specific browser-based vulnerabilities
- Discuss protection measures
1hr. 35min.
Chapter 15 : Web Application Vulnerabilities
- Recognize Web server vulnerabilities
- Discuss ways to protect Web servers against vulnerabilities
- Pinpoint Web browser vulnerabilities
- Understand session ID exploits
- List several protective measures for Web browsers
1hr. 35min.
Chapter 16 : Windows Vulnerabilities
- Describe the windows operating systems
- Explain the vulnerabilities of Windows Server
2012,2016,2019,2022/8.1/10/11
1hr. 35min.
Chapter 17 : UNIX/Linux Vulnerabilities
- Identify UNIX-based operating systems
- Identify Linux operating systems
- Identify vulnerabilities from default installation
- Identify various vulnerabilities in Linux and UNIX-based utilities
1hr. 35min.
Chapter 18 : Incident Handling
- Identify the necessity of incident handling
- Identify different types of incidents
- Recognize the various phases of incident handling
- Note the phases in preparing for incident handling
- Describe the steps in the identification of incidents
- Understand the need for incident reporting and communication
- Describe the steps in removing a bug
- Identify the steps in recovering from an incident
- Identify the importance of following up after incident handling
- Understand the process of tracking hackers
- List emergency steps that follow an incident
1hr. 35min.
Vincent P. Nicotra
Instructor
IT GOD.
Free Courses
Duis egestas aliquet aliquet. Maecenas erat eros, fringilla et leo eget, viverra pretium nulla. Quisque sed augue tincidunt, posuere dui tempor.
Premium Courses
Duis egestas aliquet aliquet. Maecenas erat eros, fringilla et leo eget, viverra pretium nulla. Quisque sed augue tincidunt, posuere dui tempor.
Ready to get started?
Get in touch, or create an account