User Tools

Site Tools


ethical_hacking

Differences

This shows you the differences between two versions of the page.

Link to this comparison view

ethical_hacking [2018/10/04 09:29]
127.0.0.1 external edit
ethical_hacking [2018/11/26 12:08]
admin
Line 1: Line 1:
 ====== Ethical Hacking ====== ====== Ethical Hacking ======
  
 +**Track Room Location: Room H132, Heritage Hall (Collin College'​s Preston Ridge campus)**
  
- +**Description** \\
-==== Track Room Location: Room H132, Heritage Hall (Collin College'​s Preston Ridge campus) ==== +
- +
- +
- +
-===== Description ​===== +
- +
- +
 This course is designed for students who need to acquaint themselves with the world of offensive information security. This penetration testing training introduces the latest hacking tools and techniques in the field and simulates a full penetration test, from start to finish, by injecting the student into a diverse and vulnerable network. This class also explores the legal and ethical aspects of utilizing these tools in industry. This course is designed for students who need to acquaint themselves with the world of offensive information security. This penetration testing training introduces the latest hacking tools and techniques in the field and simulates a full penetration test, from start to finish, by injecting the student into a diverse and vulnerable network. This class also explores the legal and ethical aspects of utilizing these tools in industry.
- 
- 
  
 The course is designed for students who need to acquaint themselves with the world of offensive information security. Students will not only apply knowledge of security concepts, tools, and procedures to react to security incidents, it ensures that they can anticipate security risks and guard against them. This class will also cover investigative techniques and post-mortem analysis of attacks on a network. The course is designed for students who need to acquaint themselves with the world of offensive information security. Students will not only apply knowledge of security concepts, tools, and procedures to react to security incidents, it ensures that they can anticipate security risks and guard against them. This class will also cover investigative techniques and post-mortem analysis of attacks on a network.
  
- +**Prerequisites** \\
- +
-===== Prerequisites ​===== +
- +
- +
 Basic computer knowledge, networking skills are preferred. Linux knowledge recommended,​ but not required. Basic computer knowledge, networking skills are preferred. Linux knowledge recommended,​ but not required.
  
- +**Instructor**
- +
-===== Instructor ​=====+
  
 **Paul Burkholder** has been an instructor for 15 years. At Rhodes State College in Lima, Ohio, Paul teaches Linux, Ethical Hacking, CCNA, CCNA Security, and CCNP courses. He's led several "Train The Trainers"​ sessions covering CCNA, CCNAS, CCNP, Ethical Hacking, Security+, and Linux. Paul is CCNA and CCNAS as well as a certified Cisco Academy Instructor. He's currently pursing Linux+, Security+, and LPIC certifications. **Paul Burkholder** has been an instructor for 15 years. At Rhodes State College in Lima, Ohio, Paul teaches Linux, Ethical Hacking, CCNA, CCNA Security, and CCNP courses. He's led several "Train The Trainers"​ sessions covering CCNA, CCNAS, CCNP, Ethical Hacking, Security+, and Linux. Paul is CCNA and CCNAS as well as a certified Cisco Academy Instructor. He's currently pursing Linux+, Security+, and LPIC certifications.
  
 +**Agenda**
  
 +  * Information Gathering
 +  * Vulnerability Identification
 +  * Wireless Network Analysis
 +  * Password Auditing
 +  * Forensics/​Packet Analysis
 +  * Metasploit Introduction and Information Gathering and Scanning
 +  * OS Vulnerability Assessment and Exploitation
 +  * Client Side Exploits and AV Bypass
 +  * Using Meterpreter
 +  * Armitage/​Cobalt Strike
 +  * Social Engineering Toolkit
  
-===== Agenda =====+**Instructor Links** \\ To be provided during the sessions.
  
 +//Please note that content is subject to change or modification based on the unique needs of the track participants in attendance.//​
  
- 
-Information Gathering 
- 
- 
- 
-Vulnerability Identification 
- 
- 
- 
-Wireless Network Analysis 
- 
- 
- 
-Password Auditing 
- 
- 
- 
-Forensics/​Packet Analysis 
- 
- 
- 
-Metasploit Introduction and Information Gathering and Scanning 
- 
- 
- 
-OS Vulnerability Assessment and Exploitation 
- 
- 
- 
-Client Side Exploits and AV Bypass 
- 
- 
- 
-Using Meterpreter 
- 
- 
- 
-Armitage/​Cobalt Strike 
- 
- 
- 
-Social Engineering Toolkit 
- 
- 
- 
-===== Resources ===== 
- 
- 
- 
-==== Instructor Links ==== 
- 
- 
- 
-To be provided during the sessions. 
- 
- 
- 
-//Please note that content is subject to change or modification based on the unique needs of the track participants in attendance.//​ 
  
ethical_hacking.txt · Last modified: 2018/11/26 12:08 by admin