Module
I: Security Fundamentals
Locating what needs to be secured
Identifying the range of Network Vulnerabilities
Analyzing the consequences of successful network attacks
Applying MOM analysis of threats
Security efficiency tradeoffs
Footprinting and Intelligence Gathering
Acquiring target information
Locating useful and relevant information
Scavenging published data
Mining archive sites
Scanning and enumerating resources
Identifying Vulnerabilities
Correlating weaknesses and exploits
Researching databases
Determining target configuration
What hackers need to attack a network
Analyzing the hacking tools Hands-on
Evaluating Vulnerability Assessment tools
Leveraging opportunities for attack
Hands-on exercise capturing and analysing traffic
Module
II: Addressing and Spoofing
Identifying addresses and names used in our network
Address duplication methods
MAC addresses duplication methods
IP address discovery and spoofing
Hands-on Exercise Spoofing addresses
Communications using TCP and UDP Ports
Firewall use of port filters
Discovering filtered ports
Manipulating ports to gain access
Connecting to blocked services
Hands-on exercise Port scanning
Defeating firewalls
Port scanning countermeasures
Hands-on exercise detecting port scanning
Module
III: Naming
Domain Name Service issues
Poisoning DNS
Gaining control of browsers
Creating custom malware
Harvesting client information
Enumerating internal data
Spoofing names and the impact of spoofed name
Hands-on Exercise spoofing DNS names
Implementing countermeasures to DNS spoofing
Module
IV: Authentication Systems
Pivoting and island hopping
Deploying portable media attacks
Routing through compromised clients
Forwarding and redirecting ports
Pilfering target information
Stealing password hashes
Hands-on exercise password scanning
Hands-on exercise defeating Password Scanning
Module
V: External Connections
Testing Antivirus and IDS Security
Masquerading network traffic
Sidestepping perimeter defenses
Evading antivirus systems
Falsifying file headers to inject malware
Discovering the gaps in antivirus protection
Hands-on exercise analyzing external connections
Module
VI: Using Confidentiality Techniques to
Defeat Sniffers
Using service separation techniques to isolate risk
Separating services on LANs using VLANs
Hands-on exercise deploying VLANs
Separating services over WANs using MPLS Paths
Deploying VPN Security
Separating Services using Encrypted Tunnels
Deploying Authentication options
Encryption: Symmetric and Asymmetric
DES, RSA, AES
Exploiting IPSec for VPNs over the Internet
Using PPTP Tunnels
Authenticating using RADIUS and DIAMETER
L2TP
Key management
Public Key Infrastructures for Private Data Exchange
Corporate security policies
Hands-on Exercise using VPN to defeat sniffing
Module
VII: Wireless Vulnerability
Analyzing how WiFi works
Security using WEP
Hiding access points
Hands-on Exercise scanning for access points
WEP vulnerabilities
Hands-on Exercise Hacking a Wireless Access Point using WEP
WiFi security countermeasures
Deploying IEEE 802 Security concepts
Understanding EAP, WPA and WPA-2
Deploying AAA
Hands-on exercise Implementing WPA to defeat hacking and testing vulnerability
Module
VIII: Compromising operating systems
Examining Windows protection modes
Analyzing Linux/UNIX processes
Subverting Web applications
Injecting SQL and HTML code
Bypassing authentication mechanisms
Manipulating Clients to Uncover Internal Threats
Baiting and snaring inside users
Review and Evaluation