{{col1}}
{{col0}}
Sorry, JavaScript required!

Ethical Hacking & Incident Handling

Title Ethical Hacking & Incident Handling
Course code CM317-02-2020-C
Objective After completion of this course, students will learn the common hacking ways that hackers use so that students can proactively test their company networks and systems to discover any vulnerability before hackers do. Also, students can learn the best practices of handling security incidences (in case), so that they can bring back the system online asap.
Content Day 1
    Overview of Hacking and Traffic Analysis
  • Hacking Concepts and Phases
  • TCP/IP for Intrusion Detection
  • Overview of HTTP Basics and Web Applications
  • Passive Profiling
  • Passive Profiling
  • Social Engineering and Phishing
  • Search Engines Hacking
  • Whois and DNS Search
  • Hands-On Labs on Linux and Windows Platforms
  • Active Reconnaissance
  • War-Driving
  • Live Host Mapping
  • Noisy & Stealthy Port Scanning
  • Remote Operating System Fingerprinting
  • Enumeration and Vulnerability Scanning
  • IPS Evasion & Insertion
  • Hands-On Labs on Linux and Windows Platforms
Day 2
    Penetrating System and Application Software
  • Buffer Overflows
  • Bypassing Firewalls
  • Format String Attacks
  • Front Door Attacks
  • Web Server and Web Application Attacks
  • SQL Server Attacks
  • Client Side Attacks and Man-in-the-Browser
  • Mobile Device Attacks and Security Issues
  • Hands-On Labs Linux and Windows Platforms
  • Launching Network Level Attacks
  • IP Spoofing, Web Spoofing
  • Traffic Sniffing, Packet Replay
  • Session Hijacking
  • Man-in-Middle Attack
  • Wi-Fi Network Attacks
  • Denial of Services, Distributed DoS, Botnets
  • Hands-On Labs Linux and Windows Platforms
Day 3
    Preserving Access
  • Backdoors, Remote and Reverse Shells
  • Malicious Software and its Behavior
  • Planting Trojan Horses
  • File Level and Kernel Level Rootkits
  • Pivoting to Other Systems
  • Hands-On Labs Linux and Windows Platforms
  • Covering the Tracks
  • Altering & Clearing Log Files
  • Erasing Evidences
  • Using Steganography
  • Setting up Covert Channels
  • Hands-On Labs Linux and Windows Platforms
Day 4
    Intrusion Analysis and Security Incident Responses
  • The PDCERF Model and Computer Forensics Basics
  • Preparatory Works and Detection Mechanisms
  • Network Traffic Capture and Analysis
  • Intrusion Signature and Pattern Analysis
  • Containment Strategies and Eradication Procedures
  • Recovery Steps and Follow-Up Reviews
  • Special Categories and Honeypots
  • Case Studies
Assessment In-class performance and exercises
Target audience
  • Information Security or Cyber Security Officers
  • Network Engineers
Prerequisite
  • Experience in managing computer systems and networks. e.g. Ethernet and TCP/IP, Windows and Linux.
  • Solid knowledge on computer security. e.g. Computer viruses and Trojan horses.
  • Having attended CISA & CISSP course is recommeded.
Class size 20 Full
Instructor CPTTM Appointed Instructor from Hong Kong
Instruction language Cantonese
Handout language English
Duration 24 hours in 8 sessions
Schedule 10:00-13:00, 14:00-17:00, from Feb 22, 2020 to Mar 14, 2020 every Saturday.
Fee MOP6,000
Venue Cyber-Lab (Rua Comandante Mata Oliveira, Ed. Associacao Industrial, 3-andar Macau)
Certificate Certificate of Completion/Merit issued by CPTTM (with at least 80% attendance and passed the assessment).
PDAC code ---
{{col0}}
{{col1}}
Sorry, JavaScript required!