Ethical Hacker Training
A comprehensive Ethical Hacking and Information System Security Audit program focuses on the practical demonstrations of current security threads, attack vectors, hacking techniques, methodologies, tools and security countermeasures.
Unlike other theoretical trainings, this training provides an interactive working environment. During the training, new information obtained can be used by practising hacking and penetration testing exercises in the virtual laboratory environment. It also provides practical experience for securing systems.
At first, the training starts teaching how to defend systems and then deals with scanning and attacking networks. It provides how intruders escalate privileges and what actions to be taken in order to defend systems. It also provides both theoretical and practical information about Intrusion Detection Systems (IDS), Policy Development, Social Engineering, DoS/DDoS Attacks, Buffer Overflow and Virus Creation etc.
After having this intensive training content, you will have working level of practical experience on Ethical Hacking. Besides this training program is compatible with CEHv8 (Certified Ethical Hacking) training content and you will also be prepared for EC-Council’s CEH 312-50 exam.
This training is highly beneficial to people who are interested in security, want to work and already work in security industry, security auditors, managers and are responsible for the integrity of a network infrastructure.
60 hours (theoritical and practical)
For an efficient training, it requires basic understanding on networking and Linux.
Main Course Titles:
- Network Fundamentals for Security People
- Linux Fundamentals for Security People
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance Methods
- Scanning Networks and Enumeration Methods
- System Hacking
- Sniffing Networks
- Social Engineering
- Denial of Service Attacks (DoS/DOS)
- Session Hijacking
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection Attacks
- Hacking Wireless Networks
- Evasion of IDSs, Firewalls and Honeypots
- Buffer Overflow
- Hacking VoIP Systems
- Penetration Testing & Writing Reports