User name:
Password:
 

 

Copyright © 2006.
cisco-certificatiom.co.uk
All Rights Reserved
CIW Security 1D0-470 Series: Auditing and the Control Phase
Product Code: ciws08 Time: 5.0 hour(s) CEUs: Available

Summary:

This course examines each type of attack with respect to auditing. It covers the file locations used by root kits, as well as methods of penetration and the goals a hacker has during the control phase. It also covers illicit servers.

Objectives:

  • Identify common targets of attack
  • Discuss penetration strategies and methods
  • List potential physical, OS, and TCP/IP stack attacks
  • Identify and analyze specific brute-force and DoS attacks
  • Implement methods designed to thwart penetration
  • Define control procedures
  • Identify control methods
  • List ways to document control procedures and methods


Topics:

  • Network penetration
  • Common targets
  • System bugs
  • Denial-of-service attacks
  • Combined attack strategies
  • Identifying attacks
  • Network control
  • UNIX and Windows 2000 file locations
  • UNIX passwords
  • Control methods
  • Back Orifice
  • NetBus
  • Adding administrative accounts

Technical Requirements:

P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.

Copyright � 2006 Webteks. All rights reserved.