Course Introduction

This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. 

Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). You should also have the basic knowledge of OS, Scripting languages, Networking, Computer Architecture.


Introduction to Ethical Hacking

  •   Information Security Overview
  •  Information Security Threats and Attack     Vectors
  •   Hacking Concepts, Types, and Phases
  •    Ethical Hacking Concepts and Scope
  •    Information Security Control
  •    Penetration Testing
  •   Information Security Laws and Standards

Scanning Networks

Enumeration

Social Engineering

Denial-of-Service

SQL Injection

Hacking Wireless Networks

Hacking Mobile Platforms

Evading IDS, Firewalls, and Honeypots

Footprinting and Reconnaissance

  •  Footprinting Concepts
  •  Footprinting Methodology
  • Footprinting using Advanced Google Hacking Techniques
  •   Footprinting through Social Networking Sites
  •   WHOIS Footprinting

System Hacking

Malware Threats

Sniffing

Session Hijacking

Hacking Web Servers

Hacking Web Applications

Cloud Computing

 

Cryptography

Leave A Message

There are no any courses offered by this institute...!