tailieunhanh - Network Security & Preventing Hacker

Network Security & Preventing HackerContent: What do a Malicious Hacker Do?, Level of Hacker, Gathering Information of Hacker, Trojan and Backdoor, Sniffers, Firewall and IDS, Countermeasure. Network Security: Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls | Network Security & Preventing Hacker ATHENA – Training & Network Security ĐÀO TẠO QUẢN TRỊ & AN NINH MẠNG 02 Bis Đinh Tiên Hoàng, P. Dakao, Quận 1, TP. HCM – Tel: (848) 824 4041– Fax: (848) 910 5735 Website: E-mail: training@ Content What do a Malicious Hacker Do? Level of Hacker Gathering Information of Hacker Trojan and Backdoor Sniffers Firewall and IDS Countermeasure Level of Hacker More professional, younger, daring, study from forum. Can write code spyware, virus, worm by themself Level of Hacker Denial of Services (DoS) ,DDOS Deface website Viruses & Worms Data Sniffing and Spoofing Malicious code & Trojan Port Scanning & Probing Wireless Attacks Gathering Information of Hacker Step 1. FootPrinting Step 2. Scanning Step 3. Enumertion Step 1: Footprinting Use Tools or method to get information: - Company(people, email, Location, phone) - Web Server - Database Server Mail Server Domain, IP Step 2: Scanning Step 3: Enumeration Trojan and Backdoor Sniffers ĐÀO TẠO QUẢN TRỊ & AN NINH MẠNG 02 Bis Đinh Tiên Hoàng, P. Dakao, Quận 1, TP. HCM – Tel: (848) 824 4041– Fax: (848) 910 5735 Website: E-mail: training@ Firewall and IDS Firewall and IDS Countermeasure from Attacks Using software or Hardware: Check Log files Hidden Share is off Netbios is off Firewalls IDS, IDP,IPS Application for Security Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls Thank You! | Network Security & Preventing Hacker ATHENA – Training & Network Security ĐÀO TẠO QUẢN TRỊ & AN NINH MẠNG 02 Bis Đinh Tiên Hoàng, P. Dakao, Quận 1, TP. HCM – Tel: (848) 824 4041– Fax: (848) 910 5735 Website: E-mail: training@ Content What do a Malicious Hacker Do? Level of Hacker Gathering Information of Hacker Trojan and Backdoor Sniffers Firewall and IDS Countermeasure Level of Hacker More professional, younger, daring, study from forum. Can write code spyware, virus, worm by themself Level of Hacker Denial of Services (DoS) ,DDOS Deface website Viruses & Worms Data Sniffing and Spoofing Malicious code & Trojan Port Scanning & Probing Wireless Attacks Gathering Information of Hacker Step 1. FootPrinting Step 2. Scanning Step 3. Enumertion Step 1: Footprinting Use Tools or method to get information: - Company(people, email, Location, phone) - Web Server - Database Server Mail Server Domain, IP Step 2: Scanning Step 3: Enumeration Trojan and Backdoor Sniffers ĐÀO TẠO QUẢN TRỊ & AN NINH MẠNG 02 Bis Đinh Tiên Hoàng, P. Dakao, Quận 1, TP. HCM – Tel: (848) 824 4041– Fax: (848) 910 5735 Website: E-mail: training@ Firewall and IDS Firewall and IDS Countermeasure from Attacks Using software or Hardware: Check Log files Hidden Share is off Netbios is off Firewalls IDS, IDP,IPS Application for Security Software firewall: ISA Server, anti-virus (McAfee, TrendMicro, Norton Antivirus, Symantec) Hardware Firewall: Checkpoint, PIX, Fortinet, Crossbeam, Watchguard, Sonic Walls Thank You! .

TỪ KHÓA LIÊN QUAN