System Hacking and Malicious Content


Overview/Description
Target Audience
Prerequisites
Expected Duration
Lesson Objectives
Course Number



Overview/Description
Hacking systems and planting and or sending malicious content are the two most performed actions by hackers. As an ethical hacker, it will be your responsibility to test systems against hacking and to be prepared for the different types of malicious content that hackers will try to get into your network environment. This course examines password cracking methodologies and tools, privilege escalation, keyloggers, rootkits, steganography, trojans and backdoor types and tools, and different types of viruses and worms and their countermeasures. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration (hours)
2.0

Lesson Objectives

System Hacking and Malicious Content

  • identify the tools used for password cracking and privilege escalation
  • recognize examples of strong passwords
  • differentiate between the types of password attacks
  • categorize passwords as weak or strong and recognize the types of attacks they're vulnerable to
  • identify the characteristics of hardware and software keyloggers
  • recognize how to counter rootkits
  • sequence the steps to create an alternate data stream in Windows
  • recognize the tools used for steganography and erasing evidence
  • recognize how trojans work
  • recognize the hacking tools used for covert communication, port redirection, and wrapping
  • recognize how e-mail can be used as a trojan attack vector
  • recognize the countermeasures for trojans
  • categorize viruses according to their infection techniques
  • recognize the countermeasures for viruses
  • recognize key concepts about viruses and trojans
  • Course Number:
    sp_etih_a03_it_enus