Qualified applicants enjoy quality course content, certified and highly competent instructors, credits toward Bluepoint Certified PHP Developer™ (CPD) and Bluepoint Open Network Engineer™ (ONE) certifications, and subsidized training fees.
course | LINUX NETWORK SECURITY |
duration | 18 hours |
focus | Linux system and network security |
prerequisites | Linux Express® or equivalent experience |
distributions | Fedora and CentOS |
credit towards certification | N/A |
investment | PHP 14,950.00 NON-VAT |
early bird | PHP 14,202.50 NON-VAT |
Linux® is an Open Source, full-featured, powerful and robust UNIX-like operating system based on the initial work of Linus Torvalds from the University of Helsinki in Finland. Since 1991, his work was extended and ported to many platforms by a worldwide community of software developers. Today it runs everything from embedded systems to nuclear submarines. Linux also powers Wall Street, the London Stock Exchange, the CERN supercollider, and NASA's supercomputers.
COURSE DESCRIPTION
Gain an understanding of how intruders and hackers think when attacking networks through real world examples and demonstrations. Learn how to minimize vulnerabilities and build strategies against attackers. Effectively evaluate network security and implement security best practices. All in 3 days!
COURSE OUTLINE
I. Introduction to Networking
II. Ethics and Hacking
III. Types of Attacks
Foot Printing
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Web Application Vulnerabilities
Web Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Viruses
Buffer Overflows
IV. Protection and Prevention
Cryptography
Firewalls
Intrusion Detection Systems
Honey Pots
Honey Nets
Vulnerability Assessment
Penetration Testing
II. Ethics and Hacking
III. Types of Attacks
Foot Printing
Scanning
Enumeration
System Hacking
Trojans and Backdoors
Sniffers
Denial of Service
Social Engineering
Session Hijacking
Web Application Vulnerabilities
Web Based Password Cracking Techniques
SQL Injection
Hacking Wireless Networks
Viruses
Buffer Overflows
IV. Protection and Prevention
Cryptography
Firewalls
Intrusion Detection Systems
Honey Pots
Honey Nets
Vulnerability Assessment
Penetration Testing
ATTRIBUTION
The registered trademark Linux® is used pursuant to a sublicense from Linux Mark Institute, the exclusive licensee of Linus Torvalds, owner of the mark on a world-wide basis. Fedora and CentOS are trademarks of Red Hat, Inc.