This course provides a comprehensive overview of hacking and cyber security defense and response tools and techniques. It incorporates several hands-on exercises utilizing the same attack methods used by hackers and cyber security professionals. The course starts with a discussion of why people hack and how they hack. It then focuses on the methods used, including the initial foot printing of the target, scanning the network and finally enumerating target host machines. The second day focuses on the measures necessary to protect your network from the threat. Topics include understanding your network traffic, firewalls, host hardening, intrusion detection systems and network design. Tools used for this class include: Nessus, Nmap, SuperScan, Snort, Fport, John the Ripper, and many others
Understanding your network traffic, firewalls, host hardening, intrusion detection systems and network design|Incorporates several hands-on exercises utilizing the same attack methods used by hackers and cyber security professionals
The materials within this course focus on the Knowledge Skills and Abilities (KSAs) identified within the Specialty Areas listed below. Click to view Specialty Area details within the interactive National Cybersecurity Workforce Framework.