Ethical Hacking and System Hardening

Date: 17 Jul, 18 Jul, 19 Jul 2023 | Classroom Learning

Duration: 3 Days

Course Overview

With our increasingly digitalised world, cyberthreats and cyberattacks are also alarmingly on the rise. Ethical hacking helps security professionals systematically footprint, enumerate, scan, and test-exploit their own systems. Based on the identified system weaknesses, the professionals can subsequently secure their systems by hardening the systems against future attacks.

This practice-oriented module demonstrates how cyberattacks can target hosts, networks, and web servers. It also demonstrates how the target systems can subsequently be hardened. With its hands-on approach, the module puts cybersecurity knowledge and concepts into practice by employing various offensive and defensive tools in attacking and defending systems, respectively. The participants will learn practical skills in conducting ethical hacking based on an attack methodology so as to discover weaknesses of target systems. For possible attacks, countermeasures are explained and hardening mechanisms can be applied. Topics covered include systematic attack methodology, system attacks, network attacks, and web attacks.

The module is targeted at those who need to plan and conduct vulnerability assessment and penetration testing. Upon completing this module, they are able to plan and conduct tests and checks in order to determine if infrastructure components, systems, and application meet security requirements.

This module is part of Professional Certificate in Cybersecurity Fundamentals and Ethical Hacking.

Course Objectives

This course aims to provide participants with a foundation in:

  • Overview of ethical hacking and systematic attack framework
  • How to use cybersecurity tools for footprinting and enumerating target systems
  • How to use cybersecurity tools for scanning for and exploiting vulnerabilities in target systems
  • How to perform post-exploitation steps on exploited systems, such as password cracking and backdoor-access planting
  • How to possible apply counter measures against attacks

 

At the end of the course, participants will be able to:

  • Explain ethical hacking’s objectives, stages, and available tools
  • Utilize cybersecurity tools for footprinting and enumerating target systems
  • Utilize cybersecurity tools for scanning for and exploiting vulnerabilities in target systems
  • Utilize cybersecurity tools for performing post-exploitation steps on exploited systems
  • Explain and apply possible counter measures against attacks

Who Should Attend

Penetration Tester, Cyber Incident Investigator

Prerequisites

Basic cybersecurity, Linux Operating System, basic networking

Course Convener

(Click their photos to view their short biographies)

ddddd Sufatrio

Dr SufatrioDr Sufatrio

Course Fees

Singapore Citizens
39 years old or younger
40 years old or older
Singapore PRs
Enhanced Training Support for SMEs
International Participants

Total Nett Programme Fee Payable, Including GST, after additional funding from the various funding schemes

Participants must fulfill at least 75% attendance and pass all assessment components to be eligible for SSG funding.

To enquire, email soc-ace@nus.edu.sg

To register, click Register

Course Code:
TGS-2022012263 (Classroom Learning)
TGS-2022012319 (Synchronous e-learning)

For members of public and NUS Alumnus (without R&G Voucher), please follow the steps below:

Select Short Course / Modular Course -> Apply for Myself -> Browse Academic Modules / Short Courses-> Module/Course Category -> Short Courses -> Browse Courses-> Advanced Computing for Exe (Faculty/Department / Unit)

Please download the user guide for NUS Online Application Portal after you click ‘Apply for Myself’ if you need assistance.

Course Fee Breakdown

Singapore Citizens

Singapore Citizens

39 years old or younger

Singapore Citizen

40 years old or older
Singapore PRs
Enhanced Training Support for SMEs
International Participants