What will you learn?
- Key issues plaguing the information security world, incident management process, and penetration testing
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Dierent types of Trojans, Trojan analysis, and Trojan countermeasures
- Working of viruses, virus analysis, computer worms, malware
- analysis procedure, and countermeasures
- Packet sning techniques and how to defend against sniffing
- Social Engineering techniques, identify theft, and social engineering countermeasures
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and
- DoS/DDoS countermeasures
- Various types of footprinting, footprinting tools, and countermeasures
- Enumeration techniques and enumeration countermeasures
- Network scanning techniques and scanning countermeasures