0% found this document useful (0 votes)
67 views1 page

Pen Testing Poster 2014

This document provides information about an upcoming hands-on penetration testing course being offered at King Fahd University of Petroleum and Minerals. The 4-day weekend course will teach students how to hack and infiltrate operating systems, use advanced penetration techniques like pivoting and password cracking, perform network attacks, hack web applications, and work with malwares and rootkits. The goal is for students to think like hackers in order to better defend against attacks. The course will be taught by Dr. Sami Zhioua from April 23-27, 2014 and students will receive a graduate certificate upon completion.

Uploaded by

Anonymous iNxLvw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
67 views1 page

Pen Testing Poster 2014

This document provides information about an upcoming hands-on penetration testing course being offered at King Fahd University of Petroleum and Minerals. The 4-day weekend course will teach students how to hack and infiltrate operating systems, use advanced penetration techniques like pivoting and password cracking, perform network attacks, hack web applications, and work with malwares and rootkits. The goal is for students to think like hackers in order to better defend against attacks. The course will be taught by Dr. Sami Zhioua from April 23-27, 2014 and students will receive a graduate certificate upon completion.

Uploaded by

Anonymous iNxLvw
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 1

King Fahd University of Petroleum and Minerals

College of Computer Science & Engineering


Information and Computer Science Department
Hands-On
Penetration Testing
An Improved Version of Ethical Hacking Course
As hackers expand their knowledge, so should you
You must think like them and work like them to protect your system from them
To catch a thief, you must think like a thief
Short Course
1. Introduction to Network Security
Networking Basics
Scanning
Enumeration
Standard Network Defensese
2. Hacking and inltrating Operating Systems
Understanding Vulnerabilities (B.O)
Creating back-doors
Transferring and executing les in the victim
Opening sessions
Writing exploits
Meta-Exploitation Tools
Defending against automatic exploitation
3. Advanced Penetration Techniques
Pivoting
Penetration behind NAT
zero-day exploits
Dictionary Based Password Cracking
Rainbow Table Password Cracking
Resisting password cracking attacks
4. Network Attacks and Security
Network Sning to observe trac
ARP Poisoning attacks
Man-In-The-Middle attacks
Session Hijacking
Network Conguration against Sning attacks
5. Web Application Hacking
SQL Injection Attacks
XSS Scripting Attacks
Defending against web hacking
6. Malwares and Rootkits
Dierent Types of malwares
Malware coding
Malware binders and packers
Bypassing Antivirus Tools
Social Engineering Toolkits
10. Advanced Network Security
Conguring Firewalls
Conguring Intrusion Detection Systems
Conguring Web Intrusion Detection Systems
Secure network architectures
11. Other Topics
Software Cracking
Anonymous Group Denial of Service Attacks
Etc.

Short Course Overview
Instructor: Dr. Sami Zhioua
Duration: 4 days (Weekend)
Information about the course:
Dates: April 23-27, 2014
Location: ICS Department (KFUPM)
[email protected]
Penetration Testing is an original approach to
secure systems by trying to attack them in order
to nd their weaknesses and vulnerabilities. In
this course, students will learn how to scan
computer systems and networks for
vulnerabilities, how to exploit them to get access
to the target's system/network, how to escalate
privilege, how to bypass security measures like
rewalls and antiviruses, how to sni and modify
trac in the network, how to steal sessions, how
to develop viruses and trojans, how to hack
websites, etc. The main goal of the course is to
understand how attacks work in order to
eciently defend against them.
Certicate: A graduate certicate will be
awarded to participants
Description:
Website: http://faculty.kfupm.edu.sa/ics/zhioua/PenetrationTesting
Registration: Department of Continuing
Education, Building 54, Room 107

You might also like