Key areas covered in intermediate cyber security labs:
- Introduction to Ethical Hacking
- Cover the fundamentals of key issues in the information security world
- The basics of ethical hacking
- Information security controls
- Relevant laws
- Foot Printing and Reconnaissance
- Learn how to use the latest techniques and tools to perform footprinting and reconnaissance, a critical pre-attack phase of the ethical hacking process.
- Network Fundamentals:
- Basic network topology and protocols (TCP/IP)
- Ping sweeps and port scanning with Nmap to identify open ports
- Analyzing network traffic with Wireshark
- Vulnerability Assessment:
- Identifying common vulnerabilities using vulnerability scanners
- Understanding CVEs (Common Vulnerabilities and Exploits)
- Basic remediation strategies for vulnerabilities
- Password Cracking:
- Using password cracking tools to attempt to break weak passwords
- Understanding different password-cracking techniques (dictionary attacks, brute force)
- Web Application Security:
- Identifying common web application vulnerabilities (SQL injection, XSS, CSRF)
- Using web application scanners to detect potential issues
- Basic web application security best practices
- Access Control:
- Exploring different authentication methods (username/password, multi-factor authentication)
- Understanding user permission management
- Cryptography Basics:
- Introduction to encryption algorithms (symmetric, asymmetric)
- Basic encryption/decryption exercises