System Hacking and Malicious Content
This course is included in our On-demand training solution.
Hacking systems and planting and or sending malicious content are the two most performed actions by hackers. As an ethical hacker, it will be your responsibility to test systems against hacking and to be prepared for the different types of malicious content that hackers will try to get into your network environment. This course examines password cracking methodologies and tools, privilege escalation, keyloggers, rootkits, steganography, trojans and backdoor types and tools, and different types of viruses and worms and their countermeasures. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.
Existing or in-training IT security professionals seeking detailed security penetration testing skills
A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems
Password Cracking and Privilege Escalation
Analyzing and Cracking Passwords
Keyloggers and Rootkits
Hiding Data and Erasing Evidence
Trojans and Backdoors
Trojan Attack Vectors and Countermeasures
Viruses and Worms
Dealing with Viruses and Trojans