System Hacking and Malicious Content

This course is included in our On-demand training solution.

Overview

Hacking systems and planting and or sending malicious content are the two most performed actions by hackers. As an ethical hacker, it will be your responsibility to test systems against hacking and to be prepared for the different types of malicious content that hackers will try to get into your network environment. This course examines password cracking methodologies and tools, privilege escalation, keyloggers, rootkits, steganography, trojans and backdoor types and tools, and different types of viruses and worms and their countermeasures. This course also assists students who are preparing for the EC Council’s Ethical Hacking and Countermeasures (CEHv6) exam 312-50.

Target Audience

Existing or in-training IT security professionals seeking detailed security penetration testing skills

Prerequisites

A technical background with a solid understanding of networks and networking concepts, such as TCP/IP, IP Routing, and LAN Switching, as well as Windows and/or UNIX/LINUX operating systems; a general familiarity with the principles and usage of command-line, coding, and GUI-based technologies for manipulating IT operating systems

Expected Duration

120 min.

Course Objectives

Password Cracking and Privilege Escalation

  • identify the tools used for password cracking and privilege escalation
  • recognize examples of strong passwords
  • differentiate between the types of password attacks
  • Analyzing and Cracking Passwords

    Keyloggers and Rootkits

  • identify the characteristics of hardware and software keyloggers
  • recognize how to counter rootkits
  • Hiding Data and Erasing Evidence

  • sequence the steps to create an alternate data stream in Windows
  • recognize the tools used for steganography and erasing evidence
  • Trojans and Backdoors

  • recognize how trojans work
  • recognize the hacking tools used for covert communication, port redirection, and wrapping
  • Trojan Attack Vectors and Countermeasures

  • recognize how e-mail can be used as a trojan attack vector
  • recognize the countermeasures for trojans
  • Viruses and Worms

  • categorize viruses according to their infection techniques
  • recognize the countermeasures for viruses
  • Dealing with Viruses and Trojans

    SUBSCRIPTION COST



     

    NEED HELP OR NOT SURE?