Slide 1
Module Objectives
Ethical Hacking Statement
Slide 4
Current State of Cybersecurity Current State of Affairs
Current State of Cybersecurity Vectors of Network Attacks
Current State of Cybersecurity Data Loss
Current State of Cybersecurity Data Loss (Cont.)
Slide 9
Threat Actors The Hacker
Threat Actors The Evolution of Hackers
Threat Actors Cyber Criminals
Threat Actors Hacktivists
Threat Actors State-Sponsored Hackers
Slide 15
Threat Actor Tools Video – Threat Actor Tools
Threat Actor Tools Introduction to Attack Tools
Threat Actor Tools Evolution of Security Tools
Threat Actor Tools Evolution of Security Tools (Cont.)
Threat Actor Tools Attack Types
Slide 21
Malware Overview of Malware
Malware Viruses and Trojan Horses
Malware Viruses and Trojan Horses (Cont.)
Malware Viruses and Trojan Horses (Cont.)
Malware Other Types of Malware
Slide 27
Common Network Attacks Overview of Common Network Attacks
Common Network Attacks Video - Common Network Attacks
Common Network Attacks Reconnaissance Attacks
Common Network Attacks Reconnaissance Attacks (Cont.)
Slide 32
Common Network Attacks Access Attacks
Common Network Attacks Social Engineering Attacks
Common Network Attacks Social Engineering Attacks (Cont.)
Common Network Attacks Social Engineering Attacks (Cont.)
Common Network Attacks Lab - Social Engineering
Common Network Attacks Video – Denial of Service Attacks
Common Network Attacks DoS and DDoS Attacks
Slide 40
Slide 41
IP Vulnerabilities and Threats IPv4 and IPv6
IP Vulnerabilities and Threats ICMP Attacks
IP Vulnerabilities and Threats ICMP Attacks (Cont.)
Slide 45
Slide 46
IP Vulnerabilities and Threats Address Spoofing Attacks
Slide 48
TCP and UDP Vulnerabilities TCP Segment Header
TCP and UDP Vulnerabilities TCP Services
TCP and UDP Vulnerabilities TCP Services (Cont.)
TCP and UDP Vulnerabilities TCP Attacks
TCP and UDP Vulnerabilities TCP Attacks (Cont.)
TCP and UDP Vulnerabilities TCP Attacks (Cont.)
TCP and UDP Vulnerabilities UDP Segment Header and Operation
TCP and UDP Vulnerabilities UDP Attacks
Slide 57
IP Services ARP Vulnerabilities
IP Services ARP Cache Poisoning
IP Services Video – ARP Spoofing
IP Services DNS Attacks
IP Services DNS Attacks (Cont.)
IP Services DNS Attacks (Cont.)
IP Services DNS Attacks (Cont.)
IP Services DNS Tunneling
IP Services DHCP
IP Services DHCP Attacks
IP Services DHCP Attacks (Cont.)
IP Services Lab – Explore DNS Traffic
Slide 70
Slide 71
Network Security Best Practices The Defense-in-Depth Approach
Network Security Best Practices Firewalls
Network Security Best Practices IPS
Network Security Best Practices IPS (Cont.)
Network Security Best Practices Content Security Devices
Slide 77
Cryptography Video - Cryptography
Cryptography Securing Communications
Cryptography Data Integrity
Cryptography Hash Functions
Cryptography Origin Authentication
Cryptography Data Confidentiality
Cryptography Symmetric Encryption
Cryptography Symmetric Encryption (Cont.)
Cryptography Asymmetric Encryption
Cryptography Asymmetric Encryption (Cont.)
Cryptography Asymmetric Encryption (Cont.)
Cryptography Diffie-Hellman
Cryptography Diffie-Hellman (Cont.)
Slide 91
Module Practice and Quiz What Did I Learn In This Module?
Module Practice and Quiz What Did I Learn In This Module?
Module Practice and Quiz What Did I Learn In This Module?
Slide 95