Course Overview
- Duration: 3 Days
- Certificate of attendance will be issued to those who fulfill 80% of attendance.
The course will be presented in an informal and flexible style. Interaction will be encouraged to ensure that the course proceeds at the pace and depth appropriate to the audience.
Participants will be familiarized with various vulnerability assessment tools, procedures prior to assessment, post-assessment, common vulnerability issues as well as reporting vulnerabilities found in computer system. PCs will be available for participants to experiment themselves.
Course Objectives
- Identify the most security model, information security criteria, system vulnerabilities, type of attacks threats, and countermeasures security control.
- Apply network assessment methodology.
Who Should Attend?
This course is designed for any practicing computer security analyst and developers, database administrators, business users and non-technical end users who are interested in computer forensic and security areas
- Technicians
- Supervisors
- Automation
- Designers
- Engineers
Key Topics
- Fundamental of Network Security
- Footprinting
- Google Hacking
- Scanning
- Gaining Access
- Network Assessment Methodology
Methodology
Lectures, discussions, Exercises & Practical. demonstration using Nmap, Metasploit and Nessus
Pre Requisite
- There are no prerequisites for this course.