Ethical Hacking Foundation
Penetration tests are employed by organizations that hire certified ethical hackers to penetrate networks and computer systems with the purpose of finding and fixing security vulnerabilities.
The purpose of ethical hacking is to evaluate the security of a computer system or network through the discovery and exploitation of vulnerabilities in a legal manner. Candidates are expected to be very aware of the difference between legal and illegal hacking, and the consequences of misuse.
Summary
Today’s technology is moving fast and changing
the way we do business. Companies digitize all information by
default, store their data in the cloud and use open source
software. This raises information security issues related to
network and system infrastructure. The purpose of ethical hacking is to evaluate
the security of a computer system or network through the discovery
and exploitation of vulnerabilities in a legal
manner.
The EXIN
Ethical Hacking Foundation module covers the basic steps of ethical
hacking: intelligence gathering, scanning computer network/systems,
and penetrating systems.
In more detail
the candidate will develop an understanding of the following
topics:
*
Network sniffing (gathering information from network
traffic)
* Cracking a
WEP and WPA(2) key from a wireless network
* Network
vulnerability scanning
* Basic
penetration of computer systems
* Password
cracking
* Web-based
hacking, containing SQL Injections (SQLi), Cross-Site Scripting
(XSS), Remote File Inclusions (RFI)
The EXIN
Ethical Hacking Foundation exam tests the knowledge of the
candidate on:
*
the basics of Ethical Hacking and
* the practice
of Ethical Hacking
Target group
This
certificate is meant for security officers, network architects,
network administrators, security auditors, security professionals,
computer programmers and networking experts, managers working in
the field of ethical hacking and anyone who is interested in
improving and/or testing the security of an IT infrastructure. The
module is also meant for (beginning) ethical hackers who want to
get certified and verify their knowledge.
Prerequisite(s)
None. However,
a training Ethical Hacking Foundation and knowledge of Linux is
highly recommended.
Examination details
* Exam duration: 60
minutes
* Number of
questions: 40
* Pass mark:
65% (26 points)
* Open
book/notes: no
* Electronic
equipment/aides permitted: no
Contact hours
The recommended minimum number of contact hours
for this training course is 16. This includes group assignments, exam preparation and
short breaks. This number of hours does not include homework, logistics for exam
preparation and lunch breaks.
Indicative study
effort
60 hours,
depending on prior knowledge
© Copyright 2014 A2A -
IMTCS. All rights reserved.
The Swirl logo is a trade
mark of AXELOS Limited.
ITIL® is a Registered
trade mark of AXELOS Limited.
PRINCE2® is a Registered
Trade Mark of AXELOS Limited.
PRINCE2 Agile™ is a Trade
Mark of AXELOS Limited.
MSP® is a Registered Trade
Mark of AXELOS Limited.
M_o_R® is a Registered
Trade Mark of AXELOS Limited.
P2MM® is a Registered
Trade Mark of AXELOS Limited.
P3M3® is a Registered
Trade Mark of AXELOS Limited.
P3O® is a Registered Trade
Mark of AXELOS Limited.
PMP®, PMI, PMBoK are
Registered Trade Marks of the Project Management
Institute.
APMP® is a Registered
Trade Mark of APM (Association of Project Management) part of
IPMA.
IPMA: International
Project Management Association