Friday 12 August 2011

content

Brief overview:

Ethical Hacking techniques
• Intrusion techniques
• Vulnerability exploits
• Countermeasure techniques
• Patching / Hardening
• Antivirus
• Firewalls and UTMs
• Cisco PIX / ASA
Checkpoint
Netasq


Ethical Hacking & Countermeasures Expert
Intrusion Techniques

• Foot Printing
• Social Engineering
• Scanning
• Exploits
• System Hacking
• Web Server Hacking
• Router Hacking
• Sniffers
• Brute Force
• Trojans
• Key loggers
• Phishing
• Metasploits
• Wireless Hacking
Checkpoint

• Installation of Checkpoint
• NAT
• Filtering (Security Policy Rules)
• Content Filtering
• Authentication and types
• Logging
• IPSEC VPN
• Backup and Restore

Countermeasures

• Patching the vulnerabilities
• Anti-Virus and Security Suites
• Comparison between KASPERSKY and other security suites
NetASQ

• Installation of NetASQ
• Bridge Mode
• NAT
• Filtering Policy
• Content Filtering (Anti-virus, Anti-spam, URL filtering)
• Authentication
• Logging, Monitoring, Reporting
• IPSEC VPN
• SSL VPN
• Backup and Restore
• ASQ (IPS) and QoS
• SEISMO
Firewalls and UTM
Cisco PIX / ASA


• Types of Firewalls, Installation of PIX / ASA
• Bridge Mode
• Basic Configuration
• NAT
• Filter Rules
• URL filtering
• Authentication
• Logging and Reporting
• VLANs
• IPSEC VPN
• Fail-over
• Password Recovery
• Back-up, Restore and Upgrade
Live Practicals and Case study

No comments:

Post a Comment