資源描述:
《ethical hacking and countermeasures》由會員上傳分享,免費在線閱讀,更多相關(guān)內(nèi)容在教育資源-天天文庫。
1、EthicalHackingandCountermeasuresCourseOutline(Version8)Module01:IntroductiontoEthicalHacking§InformationSecurityOverviewoInternetCrimeCurrentReport:IC3oDataBreachInvestigationsReportoEssentialTerminologyoElementsofInformationSecurityoTheSecurity,Functionali
2、ty,andUsabilityTriangle§InformationSecurityThreatsandAttackVectorsoTopInformationSecurityAttackVectorsoMotives,Goals,andObjectivesofInformationSecurityAttacksoInformationSecurityThreatsoInformationWarfareoIPv6SecurityThreats§HackingConceptsoHackingvs.Ethica
3、lHackingoEffectsofHackingonBusinessoWhoIsaHacker?oHackerClassesoHacktivism§HackingPhasesPage
4、2§TypesofAttacksoTypesofAttacksonaSystemoOperatingSystemAttacksoMisconfigurationAttacksoApplication-LevelAttacksoExamplesofApplication-LevelAttacksoShrinkWrapCodeAt
5、tacks§InformationSecurityControlsoWhyEthicalHackingisNecessaryoScopeandLimitationsofEthicalHackingoSkillsofanEthicalHackeroDefenseinDepthoIncidentManagementProcessoInformationSecurityPoliciesoClassificationofSecurityPoliciesoStructureandContentsofSecurityPo
6、liciesoTypesofSecurityPoliciesoStepstoCreateandImplementSecurityPoliciesoExamplesofSecurityPoliciesoVulnerabilityResearchoVulnerabilityResearchWebsitesoWhatIsPenetrationTesting?oWhyPenetrationTestingoPenetrationTestingMethodologyModule02:FootprintingandReco
7、nnaissance§FootprintingConceptsoFootprintingTerminologyoWhatisFootprinting?oWhyFootprinting?oObjectivesofFootprintingPage
8、3§FootprintingThreatsoFootprintingThreats§FootprintingMethodologyoFootprintingthroughSearchEngines·FindingCompany’sExternalandInternalU
9、RLs·PublicandRestrictedWebsites·CollectLocationInformation·PeopleSearch·PeopleSearchOnlineServices·PeopleSearchonSocialNetworkingServices·GatherInformationfromFinancialServices·FootprintingthroughJobSites·MonitoringTargetUsingAlertsoWebsiteFootprinting·Mirr
10、oringEntireWebsite·WebsiteMirroringTools·ExtractWebsiteInformationfromhttp://www.archive.org·MonitoringWebUpdatesUsingWebsiteWatcheroEmailFootprinting·TrackingEmailCommunications·CollectingInformationf