Click here to load reader
Upload
buidien
View
213
Download
1
Embed Size (px)
Citation preview
[email protected] | 1-877-882-9540 | www.QualiTestGroup.com
For more information on QualiTest’s Tester Training Courses, please contact us using the information below:
Ethical Hacking/Penetration Testing
Course Objectives
Understand industry regulations and certification programs
Understand the different types of testing available
White box vs. Black box testing
Use some of the tools for assessment
Use some of the tools for testing
Description
Penetration testing is a method of evaluating the
security of a computer system or network by sim-
ulating an attack by a malicious hacker. This two-
day hands on course provides an overview of con-
cepts and tools used with ethical hacking and pen-
etration testing to help you identify threats facing
your organization and determine the level of
testing required for your organization.
Prerequisites and Logistics
The course is intended for testers, analysts, engi-
neers, technical and functional managers who
need to develop knowledge of ethical hacking and
penetration testing to support their testing efforts.
Course length: 2 days
Course format: lecture plus individual and group
exercises and discussions.
Course logistics: Each attendee is provided with
his/her own copy of the course manual and exer-
cise set. Attendees do not need access to personal
computers or workstations.
[email protected] | 203-202-2682 | www.QualiTestGroup.com
To see the QualiTest ICD-10 Test Accelerators in Action: www.qualitestgroup.com/ICD-10-Testing
Ethical Hacking/Penetration Testing
Topical Overview
Introduction
What is penetration testing
Rules of Engagement
Obtaining Permission
Internal vs. External attacks
Information Gathering
Scanning
Packet sniffing
Vulnerabilities to attack
Kernel Flaws
Social Engineering and Physical
Security
Password Cracking
Client-Side Penetration Testing
Information Theft
Tunneling
Windows and Linux specific Attacks
Server-Side Penetration Testing
Spoofing
Denial of Service
Attacking of Wireless LAN
Internet-based Application Hacking
Form and URL Manipulation
Session Hijacking
Password Theft
Detection and Evasion
Intrusion Detection Systems (IDS)
Methods of Evasion