Career Academy – Hacking, Penetration Testing and Countermeasures Training – Module 1 & 2 | 312.74 Mb

Module 1
Ethical Hacking and Penetration Testing
Security 101
Hacking Hall of Fame
What are Today’s hackers Like?
Today’s Hackers
Risk Management
Evolution of Threats
Typical Vulnerability Life Cycle
What is Ethical Hacking?
Rise of the Ethical Hacker
Types of Security Test
Penetration Test (Pen-test)
Red Teams
Testing Methodology
VMWare Workstation
Windows and Linux Running VMWare
Linux Is a Must
Linux Survival Skills
Useful vi Editor Commands
Module 1 Review

Module 2
Footprinting and Reconnaissance
Desired Information
Find Information by the Target (Edgar)
Network Reconnaissance & DNS Search
Query Whois Databases
Command-Line Whois Searches
ARIN whois: Search IP Address Blocks
SamSpade Tool and Website
Internet Presence
Look Through Source Code
Mirror Website
Find Specific Types of Systems
Big Brother
Specific Data Being Available?
Countermeasures to Information Leakage
Social Engineering
DNS Zone Transfer
Nslookup command-line utility
Zone Transfer from Linux
Automated Zone Transfers
Zone Transfer Countermeasures
Tracing Out a Network Path
tracert Output
Free Tools
War Dialing for Hanging Modems
Manual and Automated War Dialing
Case Study
Footprinting Countermeasures
Demo – Footprinting & Info Gathering





1 Comment

  1. Hi there, awesome site. I thought the topics you posted on were very interesting. I tried to add your RSS to my feed reader and it a few. take a look at it, hopefully I can add you and follow.

    Testing Training with Live Project

    Posted on September 21, 2012 at 11:27 AM