ITP457-Study.Guide

ITP457-Study.Guide - Study
Guide
–
ITP
457
 •

Info iconThis preview shows page 1. Sign up to view the full content.

View Full Document Right Arrow Icon
This is the end of the preview. Sign up to access the rest of the document.

Unformatted text preview: Study
Guide
–
ITP
457
 • Lecture
1
–
Security
Overview
 o What
is
Security?
 Define
the
AIC
in
detail
 o How
does
security
help
business?
 o What
is
management
support
for
security
important?
 o Return
on
Investment
 o Risk
Management
 o Security
Methodology
 o Three
D’s
of
Security
 o 5
Steps
to
Better
Security
 o Security
Strategy
vs
Tactics
 Lecture
2
‐
Networking
 o OSI
Model
vs
TCP/IP
Model
 Know
the
layers
 Examples
of
each
layer
 o Protocol
 o TCP
vs
UDP
 o Movement
of
Data
 Lecture
3
–
Network
Scanning
 o Know
Nmap
 ‐sS
,
‐sP,
‐sT
 Pros/Cons
of
each
 o Difference
between
port/ping
scan
 o Know
some
Default
Ports
 o Know
how
to
read
namp
results
 o Difference
between
Nmap
vs
Unicronscan
 Lecture
4
–Vulnerability
Scanner
 o Know
how
to
use
Nessus
 o How
do
they
work
 Lecture
5
–
Google
hacking
 o How
does
Google
work
 o Google
Operators
 o Surfing
Anonymously
 Lecture
6/7
–
Exploitation
 o How
to
get
exploit
code
 o Why
move
to
frameworks
 o Exploit,
Payload,
Options,
Encoders
 o Metasploit
interfaces
 o Metasploit
Debugging
 o Meterperter
 • • • • • • • • Lecture
8
–
System
Hacking
 o What
to
do
after
you
get
into
a
system?
 o Name
some
network
sniffers,
why
would
you
not
particular
software
 o Keyloggers
 Hardware
vs
software
 o Password
Cracking
Techniques
 o Alternatives
to
Sniffing
 Lecture
9
–
Custom
Packet
Generation
 o Why
 o Hping
vs
Scapy
 o Firewalking
 o Using
Hping/Scapy
 Labs
 o Understand
the
tools
 o Understand
buffer
overflow
and
how
to
find
it
 Registers
and
what
you
did
 ...
View Full Document

This document was uploaded on 09/13/2010.

Ask a homework question - tutors are online