Network Security Open Source Software Certification

Published on June 2016 | Categories: Types, Brochures | Downloads: 70 | Comments: 0 | Views: 233
of 6
Download PDF   Embed   Report

Vskills certification for Network Security Open Source Software Developer assesses the candidate as per the company’s need for network security software development. The certification tests the candidates on various areas in writing Plug-ins for nessus, ettercap network sniffer, Nikto vulnerability scanner, extending hydra and nmap, writing modules for the Metasploit framework, extending Webroot, writing network sniffers and packet-injection tools.

Comments

Content
























Certified Network Security Open
Source Software Developer
VS-1145
Certified Network Security Open Source Software Developer
www.vskills.in


C CC Certified ertified ertified ertified Network Security Open Source Network Security Open Source Network Security Open Source Network Security Open Source
Software Developer Software Developer Software Developer Software Developer
Certification Code Certification Code Certification Code Certification Code VS-1145
Vskills certification for Network Security Open Source Software Developer assesses the
candidate as per the companys need for network security software development! "he
certification tests the candidates on various areas in writin# $lu#-ins for nessus% ettercap
network sniffer% Nikto vulnera&ility scanner% e'tendin# hydra and nmap% writin# modules
for the (etasploit framework% e'tendin# )e&root% writin# network sniffers and packet-
in*ection tools!

)hy should one take this certification+ )hy should one take this certification+ )hy should one take this certification+ )hy should one take this certification+
"his Course is intended for professionals and #raduates wantin# to e'cel in their chosen
areas! ,t is also well suited for those who are already workin# and would like to take
certification for further career pro#ression!

-arnin# Vskills Network Security Open Source Software Developer Certification can help
candidate differentiate in today.s competitive *o& market% &roaden their employment
opportunities &y displayin# their advanced skills% and result in hi#her earnin# potential!

)ho will &enefit from takin# this certification+ )ho will &enefit from takin# this certification+ )ho will &enefit from takin# this certification+ )ho will &enefit from takin# this certification+
/o& seekers lookin# to find employment in network security or ," departments of various
companies% students #enerally wantin# to improve their skill set and make their CV
stron#er and e'istin# employees lookin# for a &etter role can prove their employers the
value of their skills throu#h this certification!
"est Details "est Details "est Details "est Details
• Duration0 Duration0 Duration0 Duration0 12 minutes
• No! of 3uestions0 No! of 3uestions0 No! of 3uestions0 No! of 3uestions0 52
• (a'imum marks0 (a'imum marks0 (a'imum marks0 (a'imum marks0 52% $assin# marks0 45 55267
"here is no ne#ative markin# in this module!
8ee Structure 8ee Structure 8ee Structure 8ee Structure
9s! :%222;- 5,ncludes all ta'es7
Companies that hire Vskills Companies that hire Vskills Companies that hire Vskills Companies that hire Vskills Network Security Open Source Software Network Security Open Source Software Network Security Open Source Software Network Security Open Source Software
Developer Developer Developer Developer
Network Security Open Source Software Developers are in #reat demand! Companies
speciali<in# in network security software development are constantly hirin# skilled Network
Security Open Source Software Developers! Various pu&lic and private companies also
need Network Security Developers for their network security or ," departments!

Certified Network Security Open Source Software Developer
www.vskills.in

"a&le of Contents "a&le of Contents "a&le of Contents "a&le of Contents

1! 1! 1! 1! )ritin# $lu# )ritin# $lu# )ritin# $lu# )ritin# $lu#- -- -ins for Nessus ins for Nessus ins for Nessus ins for Nessus
1.1 The Nessus Architecture
1.2 Installing Nessus
1.3 Using Nessus
1.4 The NASL Interpreter
1.5 Hello World
1.6 Datatypes and Variables
1.7 Operators
1.8 if...else
1.9 Loops
1.10 Functions
1.11 Predefined Global Variables
1.12 Important NASL Functions
1.13 Nessus Plug-ins

4! 4! 4! 4! Developin# Dissectors and $lu# Developin# Dissectors and $lu# Developin# Dissectors and $lu# Developin# Dissectors and $lu#- -- -ins for the -ttercap Network Sniffer ins for the -ttercap Network Sniffer ins for the -ttercap Network Sniffer ins for the -ttercap Network Sniffer
2.1 Installing and Using Ettercap
2.2 Writing an Ettercap Dissector
2.3 Writing an Ettercap Plug-in

:! :! :! :! -'tendin# =ydra and Nmap -'tendin# =ydra and Nmap -'tendin# =ydra and Nmap -'tendin# =ydra and Nmap
3.1 Extending Hydra
3.2 Adding Service Signatures to Nmap

4! 4! 4! 4! )ritin# $lu# )ritin# $lu# )ritin# $lu# )ritin# $lu#- -- -ins for the Nikto Vulnera&ility Scanner ins for the Nikto Vulnera&ility Scanner ins for the Nikto Vulnera&ility Scanner ins for the Nikto Vulnera&ility Scanner
4.1 Installing Nikto
4.2 Using Nikto
4.3 Nikto Under the Hood
4.4 Existing Nikto Plug-ins
4.5 Adding Custom Entries to the Plug-in Databases
4.6 Using LibWhisker
4.7 Writing an NTLM Plug-in for Brute-Force Testing
4.8 Writing a Standalone Plug-in to Attack Lotus Domino

5! 5! 5! 5! )ritin# (odules for the (etasploit 8ramework )ritin# (odules for the (etasploit 8ramework )ritin# (odules for the (etasploit 8ramework )ritin# (odules for the (etasploit 8ramework
5.1 Introduction to MSF
5.2 Overview of Stack Buffer Overflows
5.3 Writing Exploits for MSF
5.4 Writing a Module for the MnoGoSearch Overflow
5.5 Writing an Operating System Fingerprinting Module for MSF


Certified Network Security Open Source Software Developer
www.vskills.in

1! 1! 1! 1! -'tendin# Code >nalysis to the )e&root -'tendin# Code >nalysis to the )e&root -'tendin# Code >nalysis to the )e&root -'tendin# Code >nalysis to the )e&root
6.1 Attacking Web Applications at the Source
6.2 Toolkit
6.3 PMD
6.4 Extending PMD

?! ?! ?! ?! 8un with @inu' Aernel (odules 8un with @inu' Aernel (odules 8un with @inu' Aernel (odules 8un with @inu' Aernel (odules
7.1 Hello World
7.2 Intercepting System Calls
7.3 Hiding Processes
7.4 Hiding from netstat

B! B! B! B! Developin# )e& >ssessment "ools and Scripts Developin# )e& >ssessment "ools and Scripts Developin# )e& >ssessment "ools and Scripts Developin# )e& >ssessment "ools and Scripts
8.1 Web Application Environment
8.2 Designing the Scanner
8.3 Building the Log Parser
8.4 Building the Scanner
8.5 Using the Scanner
8.6 Complete Source Code

C! C! C! C! >utomated -'ploit "ools >utomated -'ploit "ools >utomated -'ploit "ools >utomated -'ploit "ools
9.1 SQL Injection Exploits
9.2 The Exploit Scanner
9.3 Using the Scanner

12! 12! 12! 12! )ritin# Network Sniffers )ritin# Network Sniffers )ritin# Network Sniffers )ritin# Network Sniffers
10.1 Introduction to libpcap
10.2 Getting Started with libpcap
10.3 libpcap and Wireless Networks
10.4 libpcap and Perl
10.5 libpcap Library Reference

11! 11! 11! 11! )ritin# $acket )ritin# $acket )ritin# $acket )ritin# $acket- -- -,n*ection "ools ,n*ection "ools ,n*ection "ools ,n*ection "ools
11.1 Introduction to libnet
11.2 Getting Started with libnet
11.3 Advanced libnet Functions
11.4 Combining libnet and libpcap
11.5 Introducing AirJack








Certified Network Security Open Source Software Developer
www.vskills.in


Sample Duestions Sample Duestions Sample Duestions Sample Duestions
1! 1! 1! 1! )hich escape character is used for line feed for )hich escape character is used for line feed for )hich escape character is used for line feed for )hich escape character is used for line feed for N>S@ interpreter N>S@ interpreter N>S@ interpreter N>S@ interpreter+ ++ +
>! En
F! Er
C! E'
D! None of the a&ove

4 44 4! ! ! ! )hich of the followin# is used )hich of the followin# is used )hich of the followin# is used )hich of the followin# is used to to to to perform e'ponentiation perform e'ponentiation perform e'ponentiation perform e'ponentiation for for for for N>S@ interpreter N>S@ interpreter N>S@ interpreter N>S@ interpreter+ ++ +
>! G
F! HH
C! I
D! None of the a&ove

: :: :! ! ! ! )hat is )hat is )hat is )hat is - -- -ttercap+ ttercap+ ttercap+ ttercap+
>! 8irewall
F! =""$ pro'y
C! Network analy<er
D! None of the a&ove

4 44 4! ! ! ! )hich SD@ command is used &y D>"> )9,"- e'ploit for SD@ in*ection+ )hich SD@ command is used &y D>"> )9,"- e'ploit for SD@ in*ection+ )hich SD@ command is used &y D>"> )9,"- e'ploit for SD@ in*ection+ )hich SD@ command is used &y D>"> )9,"- e'ploit for SD@ in*ection+
>! ,NS-9"
F! S-@-C"
C! JN,ON
D! None of the a&ove

5 55 5! ! ! ! )hich pro#rammin# lan#ua#e is used for li&pcap )hich pro#rammin# lan#ua#e is used for li&pcap )hich pro#rammin# lan#ua#e is used for li&pcap )hich pro#rammin# lan#ua#e is used for li&pcap+ ++ +
>! C
F! CKK
C! /ava
D! None of the a&ove


Answers: 1 (B), 2 (B), 3 (C), 4 (A), 5 (A)


Sponsor Documents

Or use your account on DocShare.tips

Hide

Forgot your password?

Or register your new account on DocShare.tips

Hide

Lost your password? Please enter your email address. You will receive a link to create a new password.

Back to log-in

Close