Course Description
Employees are often a major security concern in big business, as social engineering is one of the most used methods to gain information and thus allow corporate networks to be hacked. Sniffing of corporate networks is also a method that hackers use to gain access to corporate resources. This course examines different types of social engineering and identity theft, along with sniffing techniques such as flooding and spoofing, the tools used both to perform and prevent them, and countermeasures that can be taken. This course also assists students who are preparing for the EC Council's Ethical Hacking and Countermeasures (CEHv6) exam 312-50.
Learning Objectives- Categorize examples of human-based social engineering
- Recognize methods for computer-based social engineering
- Identify examples of insider attacks
- Identify types of phishing attacks
- Identify the countermeasures for social engineering
- Analyze social engineering scenarios and recommend countermeasures
- Recognize how ARP spoofing works
- Recognize how DNS spoofing works
- Recognize how to counter sniffing
- Recognize the techniques used for ARP, MAC, and DNS sniffing
Audience
Existing or in-training IT security professionals seeking detailed security penetration testing skills
Comments
Retired