This specialist course deals with the method of operation and instruments used by modern hackers. The participants learn the mind-set and working methods of a hacker. In this way they are in a position to understand the individual processing phases of an attack. They learn to judge the threats posed by hackers and to recognize the weak points in company networks.
In particular, the participants learn how to use suitable defence measures against hackers.
Network administrators, system engineers, Security Officers
Introduction into the IT security problems
Processing phases of a hacker attack
Phase 1: Reconnaissance techniques;
Phase 2: Scanning
Utilization of Ping, Traceroute, ...
Nmap and Nessus use
Phase 3: Obtaining access to the computer:
Password attacks (Password guessing, Password cracking
Sniffing and spoofing
Phase 4: Denial-of-Service (DOS) attacks
Local and remote attacks
Distributed Denial-of-Service (DDOS) attacks
Phase 5: Keeping open the access to the computer
Phase 6: Hiding the activities
Manipulation of the Log files
Creating invisible files
Attending the "Networking", and "TCP/IP Protocol" courses or equivalent knowledge.
Please contact us for any queries, we will be happy to be of assistance.
The course is carried out as a combination of presentation and workshop. The individual modules are initiated by an introductory presentation. They are then extended by a various "live" demonstrations / exercises.
All participating PCs have an Internet connection, SW analyser (Sniffer or Etherreal), port scanner,