Understanding & Preventing Network and System Security Attacks
Hackers prepare for a serious attack the way Generals prepare for war. They spend months collecting intelligence about their target and use this knowledge to launch an attack. Their ultimate goal varies: inserting malicious code to damage systems, taking assets offline, or staging a return for the ongoing theft of intellectual property.
This course provides in-depth demonstrations and real-world examples of how hackers infiltrate systems and what can be done to stop them. It delivers a step-by-step approach showing the penetration techniques used by intruders to compromise your system. This knowledge will be reinforced with up to 17 live demonstrations of hacker attacks. Common security pitfalls and shortcomings are highlighted, including the advantage they provide to hackers. By understanding the methods used by hackers and familiarizing yourself with the tools of this trade, this course provides you with the knowledge required to develop your own self-defence plan against network attacks.
This course has SOLD OUT numerous times in Ottawa with 100% of attendees ranking it good to excellent!
This one-day course will focus on the hacker's mode of operation:
- The tools commonly used by the hacker underground.
- The methodologies used to penetrate and compromise an asset.
- Common pitfalls and assumptions that organizations should avoid.
- Countermeasures and best practices to provide layered defense.
Topics will include: attack stages by type, understanding scanning (both common and leading edge techniques), enumeration, perimeter attacks, IP infrastructure vulnerabilities and exploits, setting the stage for return visits, the types and techniques of man-in-the-middle attacks, traffic redirection attacks, anti-forensics techniques, and more. Counter-measures will be prescribed throughout the course.
I.T. professionals will learn how to identify real hacker threats to their information assets and understand the most appropriate counter-measures. Business executives will gain knowledge on where to focus their security spending to effectively prevent hacker intrusions.
Continuing education credits can be applied to CISSP and CISA holders.
Who Should Attend
This course is intended for business and technology managers, security professionals, systems engineers and architects, web administrators, network administrators and developers. It will educate professionals who need to learn about the best practices and techniques needed to counter the attacks hackers employ.
Back to main training page
Cygnos IT Security employs seasoned
consultants. Our educators are recognized as industry
experts in their fields and provide students with the
benefits of their field experience when instructing.
Click here for details on our
The cost of registration for this course is $895. Click here to register on-line, or contact:
(613) 820-4547 Ext. 206
Do you have a friend or colleague who may also be interested in our courses? Send them a link to this page!