Linux® is an Open Source, full-featured, powerful and robust UNIX-like operating system based on the initial work of Linus Torvalds from the University of Helsinki in Finland. Since 1991, his work was extended and ported to many platforms by a worldwide community of software developers. Today it runs everything from embedded systems to nuclear submarines. Linux also powers Wall Street, the London Stock Exchange, the CERN supercollider, and NASA's supercomputers.
Gain an understanding of how intruders and hackers think when attacking networks through real world examples and demonstrations. Learn how to minimize vulnerabilities and build strategies against attackers. Effectively evaluate network security and implement security best practices. All in 3 days!
I. Introduction to Networking
II. Ethics and Hacking
III. Types of Attacks Foot Printing Scanning Enumeration System Hacking Trojans and Backdoors Sniffers Denial of Service Social Engineering Session Hijacking Web Application Vulnerabilities Web Based Password Cracking Techniques SQL Injection Hacking Wireless Networks Viruses Buffer Overflows
IV. Protection and Prevention Cryptography Firewalls Intrusion Detection Systems Honey Pots Honey Nets Vulnerability Assessment Penetration Testing
The registered trademark Linux® is used pursuant to a sublicense from Linux Mark Institute, the exclusive licensee of Linus Torvalds, owner of the mark on a world-wide basis. Fedora and CentOS are trademarks of Red Hat, Inc.