Search results: 3125
In this course, students perform a penetration test on a server by utilizing the tools in Kali Linux. Other vulnerability scanner programs (Nessus and OpenVas) are installed on Kali Linux to execute an automatic vulnerability assessment. Students gain access to the server and steal the passwords by exploiting the discovered vulnerabilities. Then, they try to crack the passwords. The test is conducted based on ethical hacking methodologies to have a systematic lane in order to bring better results. Legal and ethical standards respected throughout the practicals. Based on the results, counter measurements are generated and supported against the vulnerabilities. Finally, all the findings are explained and illustrated in an official report.
This course covers both the fundamentals and advanced topics in operating system (OS) security. Access control mechanisms (e.g., SACL/DACL), memory protections, and interprocess communications mechanisms will be studied. Students will learn the current state-of-the-art OS-level mechanisms and policies designed to help protect systems against sophisticated attacks. In addition, advanced persistent threats, including rootkits and malware, as well as various protection mechanisms designed to thwart these types of malicious activities, will be studied. Advanced kernel debugging techniques will be applied to understand the underlying protection mechanisms and analyze the malicious software. Students will learn both hardware and software mechanisms designed to protect the OS (e.g., NX/ASLR/SMEP/SMAP).
- Teacher: Mary Agoyi