|
Ethical Hacking
- Expertise in Techniques & Methodologies
- Attack Signatures
- Tools (Nmap, Tripwire, Snort, Nessus, TCPdump, LanGaurd)
Computer Forensics & Crime Analysis
- Tools (TCT, Mactimes, Sigwin, Macdaddy, and GNU Unix utlilities)
Security Assessment
- Network Vulnerabilities Detection
- Systems Security Assessment
- Information & Applications Security
- Audits and Security Policy Formulation
Incidence Logging & Response Management
Disaster Recovery
Cryptography
- Encryption Key Development (Symmetric, Asymmetric)
- Scripting
- Binary Assessment
- Tools & Techniques (SSH, RSA SecureID, IPSec)
Intrusion detection
Network Security
- Firewalls (Stonegate, Eagle Raptor, PIX, Check Point)
- OS (Unix, Linux, NT)
Network Administration
- TCP/IP, NIS, NFS, SAMBA
- Authentication
- Firewalls
- Sniffers
System Administration (Unix, Linux, SCO, NT, MVS)
Standards
Copyright
| Terms & Conditions | Privacy
Policy
© 1999- Cosmic Software Technology, Inc.
|
|