Pen Testing Poster 2014

Published on December 2016 | Categories: Documents | Downloads: 33 | Comments: 0 | Views: 181
of 1
Download PDF   Embed   Report

Comments

Content


King Fahd University of Petroleum and Minerals
College of Computer Science & Engineering
Information and Computer Science Department
Hands-On
Penetration Testing
An Improved Version of Ethical Hacking Course
As hackers expand their knowledge, so should you
You must think like them and work like them to protect your system from them
To catch a thief, you must think like a thief
Short Course
1. Introduction to Network Security
Networking Basics
Scanning
Enumeration
Standard Network Defensese
2. Hacking and infiltrating Operating Systems
Understanding Vulnerabilities (B.O)
Creating back-doors
Transferring and executing files in the victim
Opening sessions
Writing exploits
Meta-Exploitation Tools
Defending against automatic exploitation
3. Advanced Penetration Techniques
Pivoting
Penetration behind NAT
zero-day exploits
Dictionary Based Password Cracking
Rainbow Table Password Cracking
Resisting password cracking attacks
4. Network Attacks and Security
Network Sniffing to observe traffic
ARP Poisoning attacks
Man-In-The-Middle attacks
Session Hijacking
Network Configuration against Sniffing attacks
5. Web Application Hacking
SQL Injection Attacks
XSS Scripting Attacks
Defending against web hacking
6. Malwares and Rootkits
Different Types of malwares
Malware coding
Malware binders and packers
Bypassing Antivirus Tools
Social Engineering Toolkits
10. Advanced Network Security
Configuring Firewalls
Configuring Intrusion Detection Systems
Configuring Web Intrusion Detection Systems
Secure network architectures
11. Other Topics
Software Cracking
Anonymous Group Denial of Service Attacks
Etc.

Short Course Overview
Instructor: Dr. Sami Zhioua
Duration: 4 days (Weekend)
Information about the course:
Dates: April 23-27, 2014
Location: ICS Department (KFUPM)
[email protected]
Penetration Testing is an original approach to
secure systems by trying to attack them in order
to find their weaknesses and vulnerabilities. In
this course, students will learn how to scan
computer systems and networks for
vulnerabilities, how to exploit them to get access
to the target's system/network, how to escalate
privilege, how to bypass security measures like
firewalls and antiviruses, how to sniff and modify
traffic in the network, how to steal sessions, how
to develop viruses and trojans, how to hack
websites, etc. The main goal of the course is to
understand how attacks work in order to
efficiently defend against them.
Certificate: A graduate certificate will be
awarded to participants
Description:
Website: http://faculty.kfupm.edu.sa/ics/zhioua/PenetrationTesting
Registration: Department of Continuing
Education, Building 54, Room 107

Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close