Overview/Description
Hacking systems and planting and or sending malicious content are the two most performed actions by hackers. As an ethical hacker, it will be your responsibility to test systems against hacking and to be prepared for the different types of malicious content that hackers will try to get into your network environment. This course examines password cracking methodologies and tools, privilege escalation, keyloggers, rootkits, steganography, trojans and backdoor types and tools, and different types of viruses and worms and their countermeasures. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv6) exam 312-50.
Target Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills
Prerequisites
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems