Computer Training for the IT Professional

Introduction to Hacking, Defense and Response


SKU: SEC300. Categories: , . Tags: , .

Product Description

This course provides a comprehensive overview of hacking and cyber security defense and response tools and techniques. It incorporates several hands-on exercises utilizing the same attack methods used by hackers and cyber security professionals. The course starts with a discussion of why people hack and how they hack. It then focuses on the methods used, including the initial foot printing of the target, scanning the network and finally enumerating target host machines. The second day focuses on the measures necessary to protect your network from the threat. Topics include understanding your network traffic, firewalls, host hardening, intrusion detection systems and network design. Tools used for this class include: Nessus, Nmap, SuperScan, Snort, Fport, John the Ripper, and many others.


There are no reviews yet.

Be the first to review “Introduction to Hacking, Defense and Response”

© Copyright 2015 - The Roth Group