Ethical Hacker Training

A comprehensive Ethical Hacking and Information System Security Audit program focuses on the practical demonstrations of current security threads, attack vectors, hacking techniques, methodologies, tools and security countermeasures.

Unlike other theoretical trainings, this training provides an interactive working environment. During the training, new information obtained can be used by practising hacking and penetration testing exercises in the virtual laboratory environment. It also provides practical experience for securing systems.

At first, the training starts teaching how to defend systems and then deals with scanning and attacking networks. It provides how intruders escalate privileges and what actions to be taken in order to defend systems. It also provides both theoretical and practical information about Intrusion Detection Systems (IDS), Policy Development, Social Engineering, DoS/DDoS Attacks, Buffer Overflow and Virus Creation etc.

After having this intensive training content, you will have working level of practical experience on Ethical Hacking. Besides this training program is compatible with CEHv8 (Certified Ethical Hacking) training content and you will also be prepared for EC-Council’s CEH 312-50 exam.

Target Group:

This training is highly beneficial to people who are interested in security, want to work and already work in security industry, security auditors, managers and are responsible for the integrity of a network infrastructure.

60 hours (theoritical and practical)

For an efficient training, it requires basic understanding on networking and Linux.

Main Course Titles:

  1. Network Fundamentals for Security People
  2. Linux Fundamentals for Security People
  3. Introduction to Ethical Hacking
  4. Footprinting and Reconnaissance Methods
  5. Scanning Networks and Enumeration Methods
  6. System Hacking 
  7. Malware
  8. Sniffing Networks
  9. Social Engineering
  10. Denial of Service Attacks (DoS/DOS)
  11. Session Hijacking
  12. Hacking Web Servers
  13. Hacking Web Applications
  14. SQL Injection Attacks
  15. Hacking Wireless Networks
  16. Evasion of IDSs, Firewalls and Honeypots
  17. Buffer Overflow
  18. Cryptography
  19. Hacking VoIP Systems
  20. Penetration Testing & Writing Reports