Professional Documents
Culture Documents
Principles: Attendees Will Learn About
Principles: Attendees Will Learn About
- Principles
12
Jul 2007
13
Jul 2007
T
his course deals comprehensively with significant computer
network security issues. It provides attendees with practical,
hands-on experience of major risks existing in networked
systems as well as in-depth knowledge of how these insecurities can
be mitigated through implementation of specific procedures, tools
and techniques
COURSE OUTLINE
1. Network Hacking Basics 4. Local Area Network Hacking: How Does It Happen
• Existing Scope • Virus & Trojan Horse Attacks
- Categories - Infection Sources
- Targets - Control Methods
- Tools
• Blinding Firewalls
• Hacking Approaches - Opaque Transfers
- Essentials - Rule Bending
- Brute Force
• Passive Stealth Attacks
- Stealth
- Sniffer Infiltration
- Social Engineering
- Spyware Invasion
- Invisible Wireless Access
2. Network Targeting By Hackers: How Is It Done
• Foot Printing Organizations 5. Network Hacking Defense:How To Do It Fully
- Organization Details
• Mitigating Denial-of-Service Attacks
- IP Address Range
- Traffic Filtering
- Application Servers
- Bandwidth Defense
- Domain Name System (DNS) Zone File Access
- Load Balancing
• Enumerating Networks & Live Hosts
• Applying Encryption Protocols
- ICMP / TCP / UDP Sweeps
- SSL
- Full-Connect & Stealth Scans
- IPSEC
• Profiling Networked Systems - DNSSEC
- Operating System Fingerprinting
• Deploying Firewalls
- Server Software Identification
- Firewall Organizations
- User / Group Names Identification
• Single Layer
3. Wide Area Network Hacking:How Does It Happen • Multi-Layer
• Spoofing Techniques: • Sub-Netting
- IP address - Auditing Firewall
- DNS Servers - Penetration Testing
- Web Sites • Scanning For Vulnerabilities
• Denial-of-Service Attacks - Discovering NETBIOS & SNMP Access
- Bandwidth Consumption - Checking Router Mis-Configurations
- Router Disruptions - Identifying System Software Bugs
- Server Crashing - Locating Invasive Software
• Network Breaching • Using Intrusion Detection Systems
- TCP/IP Fragmentation - Network & Host Based Detection Techniques
- FTP Bounce - Honeypot Applications - Identifying & Disabling
- Buffer Overflow Exploits Attackers
- Exploiting Network Accessible Shares • Maintaining Log File Integrity
- ICMP Misinformation - Local & Remote Logging
- Instant Messaging - Remote Log Server Setup
- VOIP Filtering
• Developing Network Security Policy
• Network Flooding - Site Access
- UDP Flood - Network Access
- TCP SYN Flood - Firewall Design
- Ping/Smurf Flood - Incident Handling
- Disaster Recovery
Course arrangEments
Course Course Course Duration Fees Enroll before these dates Cancellation
Date Title Code (Days) (HK$) to Enjoy our Early Bird Rates Deadline
July 10-11, 2007 Implementing Wireless Networks and their Security WNS 2 5,880 5,480 Jun 15, 2007 Jun 20, 2007
July 12-13, 2007 Network Security: Hacker Attacks & Defense NSPP 2 5,880 5,480 Jun 15, 2007 Jun 20, 2007
July 16-17, 2007 IT Security for Managers ITSM 2 5,880 5,480 Jun 22, 2007 Jun 27, 2007
Time: 9:00 am - 5:00 pm daily Cancellation and Substitution Policy: The On-Site Option:
Venue: Regal Hong Kong Hotel, Causeway Bay, HK. 1. There is no cancellation charge for cancellations made If there are 10 or more people in your organization
on or before the cancellation Deadline. interested in taking any of these CEL courses, why not
Payment and Confirmation: 2. Registrant(s) who fail to attend, or who cancel(s) after consider the On-Site option? We can readily tailor courses
1. Seminar fees cover full set of course materials, lunches and the cancellation deadline(s) are liable for the entire fee. to your specific needs, send an expert instructor to your
refreshments. Seminar fees are payable in advance. 3. All cancellations should be notified in writing. workplace, and help cut costs. For more information about
2. For enrolment by email, please provide all information per 4. Enrolments received AFTER the cancellation deadline are this service, please contact Miss Mak at CEL at Hong Kong
the standard Enrolment Form on this page. subject to the same cancellation deadline. telephone number 2838 1182.
3. For enrolment by fax, mail or email, CEL will issue an 5. Registrants may send substitutions in their place anytime.
acknowledgement fax or email to the Authorized Person the However, substitutions are not allowed once a seminar has Corporate Discount Scheme & Quantity
next day from receipt of the enrolment. commenced. Discounts:
4. Enrolments received by fax, mail or email on or before early Please visit our Website at www.celhk.com or telephone Ms
bird deadline will be entitled to the early bird rate. Attendance Certificate: Mak at 2838 1182 to inquire the above.
5. Joining instructions for confirmed registrations will be sent to A Certificate of Completion will be given to each delegate
the Authorized Person about 2 weeks before the seminar. who have attended more than 70% of the enrolled Communications Engineering Ltd. reserves the right to
course(s). vary the course programmes or arrangement if this proves
necessary.
ENROLMENT FORM
(Mr/Ms)
(Mr/Ms)
(Mr/Ms)
(Mr/Ms)
Company Name:
Address:
Signature: Date:
( + 2 8
Communications Engineering Ltd.
Call Miss Mak at: Rooms 802-804, Send enrolment form above to
enroll@celhk.com
Hua Qin International Building, our FAX at number: