Laboris.net

Curso relacionado
  •  DELENA DELENA
    PRECIO: 285 €
    CURSO:Distancia

    Objetivos: El objetivo principal del curso es que el alumno amplíe sus conocimientos sobre seguridad informática y conozca las nuevas tendencias en el sector, así como las herramientas más utilizadas hoy día para prevenir ataques a sistemas de redes. ...

Curso de Certified Professional Ethical Hacker

Sicap
Sicap

Curso Presencial en SICAP (México)

Precio: 2.588,44 € (+ IVA)
Duración: 5 días

Resumen del curso

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’snetwork infrastructure and how to combat against hackers and/or viruses, etc.

Requisitos: VA, S.

A quién va dirigido: • Information System Owners • Security Officers • Ethical Hackers • Information Owners • Penetration Testers • System Owner and Managers • Cyber Security Engineers

Temario completo de este curso

Course Outline

· Security Fundamentals

§ Overview

§ The Growth of

§ Environments and Security

§ Our Motivation…

§ The Goal: Protecting Information!

§ CIA Triad in Detail

§ Approach Security Holistically

§ Security Definitions

§ Definitions Relationships

§ Method: Ping

§ The TCP/IP Stack

§ Which Services Use Which Ports?

§ TCP 3-Way Handshake

§ TCP Flags

§ Malware

§ Types of Malware

§ Types of Malware Cont...

§ Types of Viruses

§ More Malware: Spyware

§ Trojan Horses

§ Back Doors

§ DoS

§ DDoS

§ Packet Sniffers

§ Passive Sniffing

§ Active Sniffing

§ Firewalls, IDS and IPS

§ Firewall – First

§ Line of Defense

§ IDS – Second Line of Defense

§ IPS – Last Line of Defense?

§ Firewalls

§ Firewall Types:

§ (1) Packet Filtering

§ Firewall Types:

§ (2) Proxy Firewalls

§ Firewall Types –

§ Circuit-Level Proxy Firewall

§ Type of Circuit-

§ Level Proxy – SOCKS

§ Firewall Types –

§ Application-Layer Proxy

§ Firewall Types: (3) Stateful

§ Firewall Types:

§ (4) Dynamic Packet-Filtering

§ Firewall Types:

§ (5) Kernel Proxies

§ Firewall Placement

§ Firewall Architecture

§ Types – Screened Host

§ Multi- or Dual-Homed

§ Screened Subnet

§ Wi-Fi Network Types

§ Wi-Fi Network Types

§ Widely Deployed Standards

§ Standards Comparison

§ 802.11n - MIMO

§ Overview of Database Server

§ Review

· Access Controls

§ Overview

§ Role of Access Control

§ Definitions

§ More Definitions

§ Categories of Access Controls

§ Physical Controls

§ Logical Controls

§ “Soft” Controls

§ Security Roles

§ Steps to Granting Access

§ Access Criteria

§ Physical Access

§ Control Mechanisms

§ Biometric System Types

§ Synchronous Token

§ Asynchronous Token Device

§ Memory Cards

§ Smart Card

§ Cryptographic Keys

§ Logical Access Controls

§ OS Access Controls

§ Linux Access Controls
§ Accounts and Groups

 
ver temario completo
 
  

Más cursos relacionados de Informática y tecnología

Recomiéndanos | Laboris.net en inicio | Favoritos | Contáctenos | Acerca de Laboris.net | Condiciones de uso | Política de privacidad | Oferta de empleo | Política de cookies

SCM Spain © 2024 EMAGISTER Servicios de formación, S.L.