Hacker Techniques, Tools, and Incident Handling

Only demo functionality is available. Module 3 is active for you to review. If you would like further review access to any of the Jones & Bartlett courses please contact your Account Representative.

Table of Contents

  1. Course Introduction
    Study Guide
    ISSA Labs: Before You Begin
    Working with Virtual Labs
    Project Description
    Introduce Yourself
  2. Reading Assignment
    -eBook: Chapter 1 Hacking: The Next Generation
    -eBook: Chapter 2 TCP/IP Review
    Lecture Presentation: Introduction to Hacking and Penetration Testing, Ethics, and the Law
    Assignment: Developments in Hacking, Cybercrime, and Malware
    Virtual Lab: Assessing and Securing Systems on a Wide Area Network (WAN)
    Assessment Worksheet for the Virtual Lab
  3. Reading Assignment
    -eBook: Chapter 5 Footprinting Tools and Techniques
    -eBook: Chapter 13 Social Engineering
    Lecture Presentation: Footprinting and Social Engineering
    Assignment: Information Gathering Plan
    Assignment: Data Gathering and Footprinting Protection Plan
    Virtual Lab: Data Gathering and Footprinting on a Targeted Web Site
    Assessment Worksheet for the Virtual Lab
  4. Reading Assignment
    -eBook: Chapter 6 Port Scanning
    -eBook: Chapter 7 Enumeration and Computer System Hacking
    Lecture Presentation: Port Scanning, Enumeration, and System Hacking
    Assignment: Top Ports and Rising Ports Review
    Virtual Lab: Using Ethical Hacking Techniques to Exploit a Vulnerable Workstation
    Assessment Worksheet for the Virtual Lab
    Project Part 1: Current Security Threats
  5. Reading Assignment
    -eBook: Chapter 9 Web and Database Attacks
    Lecture Presentation: Web and Database Attacks
    Discussion: Web Server Vulnerability Analysis
    Assignment: Web Application Attacks Prevention
    Virtual Lab: Attacking a Vulnerable Web Application and Database
    Assessment Worksheet for the Virtual Lab
    Project Part 2: Vulnerabilities in Information Technology (IT) Security
  6. Reading Assignment
    -eBook: Chapter 10 Malware
    Lecture Presentation: Malware, Worms, and Viruses
    Assignment: Malware Lifecycle
    Virtual Lab: Identifying and Removing Malware on a Windows System
    Assessment Worksheet for the Virtual Lab
  7. Reading Assignment
    -eBook: Chapter 11 Sniffers, Session Hijacking, and Denial of Service Attacks
    -eBook: Chapter 12 Linux and Penetration Testing
    Lecture Presentation: Network Analysis and Linux
    Assignment: Basic Linux Commands
    Assignment: Network Attacks
    Virtual Lab: Analyzing Network Traffic to Create a Baseline Definition
    Assessment Worksheet for the Virtual Lab
    Project Part 3: Investigate Findings on Malware
  8. Reading Assignment
    -eBook: Chapter 8 Wireless Vulnerabilities
    Lecture Presentation: Wireless Security
    Discussion: Security Features of Wireless Technologies
    Assignment: Wireless Exploit Research
    Virtual Lab: Auditing a Wireless Network and Planning for a Secure WLAN Implementation
    Assessment Worksheet for the Virtual Lab
    Project Part 4: SQL Injection
  9. Reading Assignment
    -eBook: Chapter 4 Physical Security
    -eBook: Chapter 15 Defensive Technologies
    Lecture Presentation: Physical Security and Defensive Technologies
    Assignment: Controls
    Virtual Lab: Securing the Network with an Intrusion Detection System (IDS)
    Assessment Worksheet for the Virtual Lab
  10. Reading Assignment
    -eBook: Chapter 14 Incident Response
    Lecture Presentation: Incident Response
    Assignment: Gaps in Incident Response
    Virtual Lab: Investigating and Responding to Security Incidents
    Assessment Worksheet for the Virtual Lab
    Project Part 5: Analysis of Intrusion Detection System (IDS) Traffic with Inbound Attacks
  11. Project Part 6: Defense Plan to Prevent Attacks
    Final Examination

Copyright © 2016 Jones & Bartlett Learning. All rights reserved