Muhammad Tahir Zaman
Muhammad Tahir Zaman
and Network
Defense
BY
MUHAMMAD TAHIR ZAMAN
Objectives
Describe the role of an ethical hacker
Describe what you can do legally as an ethical hacker
Describe what you cannot do as an ethical hacker
Script will be provided for practice to perform ethical hacking or penetration
testing
Crackers
Break into systems to steal or destroy data.
Ethical hacker
Performs most of the same activities but with owner’s permission
16
Professional
Security Tester
(OPST)
17
Certified Information
Systems Security
Professional (CISSP)
18
SANS Institute
SysAdmin, Audit, Network, Security (SANS)
Offers certifications through Global Information Assurance Certification
(GIAC)
Top 20 list
One of the most popular SANS Institute documents
Details the most common network exploits
Suggests ways of correcting vulnerabilities
Web site
www.sans.org (links Ch 1i & Ch 1j)