|
This course examines each type of attack with respect to auditing. It covers the file locations used by root kits, as well as methods of penetration and the goals a hacker has during the control phase. It also covers illicit servers.
Objectives:
- Identify common targets of attack
- Discuss penetration strategies and methods
- List potential physical, OS, and TCP/IP stack attacks
- Identify and analyze specific brute-force and DoS attacks
- Implement methods designed to thwart penetration
- Define control procedures
- Identify control methods
- List ways to document control procedures and methods
Topics:
- Network penetration
- Common targets
- System bugs
- Denial-of-service attacks
- Combined attack strategies
- Identifying attacks
- Network control
- UNIX and Windows 2000 file locations
- UNIX passwords
- Control methods
- Back Orifice
- NetBus
- Adding administrative accounts
|
P500+ Processor, 128MB of RAM; Windows 2000, 2003, XP, Minimum screen resolution 800x600, Internet Explorer 5.5 or higher; Windows Media Player 9.0 or higher; Flash 8.0 or higher; 56K minimum connection; broadband (256 kpbs or higher) connection recommended; Javascript, DHTML and cookies enabled; Sound card with speakers or headphones strongly recommended.
|
Product names mentioned in this catalog may be trademarks/servicemarks or registered trademarks/servicemarks of their respective companies and are hereby acknowledged. All product names that are known to be trademarks or service marks have been appropriately capitalized. Use of a name in this catalog is for identification purposes only, and should not be regarded as affecting the validity of any trademark or service mark, or as suggesting any affiliation between MindLeaders.com, Inc. and the trademark/servicemark proprietor.
Terms of Use:
|
Copyright � 2006 Webteks. All rights reserved.
|
|
|