Administrators and It security specialists who want to see security risks from the attacker’s perspective and use this insight to set up a solution scenario
Basic Windows/Linux system user and administrator skills and a fundamental understanding of the individual communication protocols (TCP/IP)
SQL programming skills are beneficial
Objetivos del curso
This security training shows you hackers operate. With the experience gained in many hands-on exercises, you will be able to recognize and repel attacks, redress security vulnerabilities, and reduce security risks. The particulars of the given productive environment are taken into account.
Contenido del curso
Who are these attackers? Their motivation and know-how
Design flaws in the TCP/IP protocol family
Sourcing information from publicly accessible databases
What are the known vulnerabilities of the software we use?
Scanning techniques under Windows
Active & passive fingerprinting
Assessing scan results and service-specific information
Buffers overflows (causes & functionality)
Tracing network intrusions step by step
Attacks against web applications & databases (SQL injection, cross-site scripting)