KT-5017 Day in the Life of a Hacker Training - Minneapolis, Minnesota IT MN Technical Financial New York, NY
Knowledge Transfer Microsoft Certified Silver Training Partner CPLS
Knowledge Transfer is a Microsoft Certified Silver Learning Partner
Oracle University

 

Microsoft Certified Training Partner CTEC
Search for a Course Topic:
Public Courses
Corporate Services & Training
 

 

 



 Course Search
Keyword
Course #
State

 Training Delivery
 
Training Delivery
Custom Curriculum
Course List
Certifications
 
 Main Menu
 
Home
View Courses
Site Index
 
 


Day in the Life of a Hacker


Description: 

An interactive introduction to the techniques of Internet hackers and the serious danger they pose to organizations. The interactive presentation challenges the audience to play the roles of hacker versus security analyst in a game of measures, attacks and countermeasures.

The goal of the hacker is to identify the 5 major weaknesses:

  • Unauthenticated Connections
  • Inbound Flows of Data
  • Complex Software
  • Unauthenticated Data
  • Software Running as a Super User
  • The audience attempts to identify defenses as the hackers works to find these major weaknesses. Highlights include a detailed analysis of buffer overflow and Malicious Mobile Code (Java/ActiveX) attacks that have crippled the Pentagon and Microsoft.

    Most of the demonstrated attacks are not stopped by firewalls or intrusion detection systems. As a result, the audience will understand that technical countermeasures are self-defeating and that the people, processes, procedures and technology aspects of security must be addressed in an effective security program.

    Demos Include:

  • Searching for Home Cable and DSL vulnerabilities
  • Port scanning
  • IP spoofing
  • User spoofing
  • E-mail spoofing
  • L0phtcrack
  • Ping of Death
  • Password exploits
  • Sendmail exploit
  • ActiveX Excel save-as exploit
  • IMAP buffer overflow
  • NT IIS buffer overflow
  • CGI exploits
  • PHF attack
  • War dialing
  • Social engineering techniques


  • Audience:

    CIO, CTO, CEO, MIS Management, Security Staff, Network Administrators, et. al.

     
    Click here to view the Course Outline
         
    Prerequisite: 
    Requires minimal technical knowledge  
       
         
    Duration: 
    Custom  
         
         

    View Printer Friendly Page

     


    To Inquire About Future Classes

    Request a class date

    if one is not scheduled.



    Comments on the Course

    Please Note:
    This course is primarily offered via private training only. If your organanization has three or more individuals interested in this course, please call us at 1-866-444-6548.