Course Code: ethhack
Duration: 35 hours
Overview:

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

The purpose of the Ethical Hacking Training is to:

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

Audience:

The Course is ideal for those working in positions such as, but not limited to:

  • Security Engineers
  • Security Consultants
  • Security Managers
  • IT Director/Managers
  • Security Auditors
  • IT Systems Administrators
  • IT Network Administrators
  • Network Architects
  • Developers
Course Outline:

01. Introduction to Ethical Hacking

02. Footprinting and Reconnaissance

03. Scanning Networks & Systems

04. Windows Hacking

05. Linux Hacking

06. Viruses, Worms, Trojans and Malware

07. Sniffing and MITM

08. Social Engineering

09. Denial-of-Service and DDOS

10. Web Hacking

11. Hacking Web Applications

12. SQL Injection and Cross Site Scripts

13. Hacking Wireless Networks

14. Android Hacking

15. Cryptography

Sites Published:

Brasil - Ethical Hacker

Canada - Ethical Hacker

中国 - Ethical Hacker

香港 - Ethical Hacker

澳門 - Ethical Hacker

台灣 - Ethical Hacker

USA - Ethical Hacker

Österreich - Ethical Hacker

Schweiz - Ethical Hacker

Deutschland - Ethical Hacker

Czech Republic - Ethical Hacker

Denmark - Ethical Hacker

Estonia - Ethical Hacker

Finland - Ethical Hacker

Greece - Ethical Hacker

Magyarország - Ethical Hacker

Ireland - Ethical Hacker

Luxembourg - Ethical Hacker

Latvia - Ethical Hacker

España - Hacker Ètico

Italia - Ethical Hacker

Lithuania - Ethical Hacker

Nederland - Ethical Hacker

Norway - Ethical Hacker

Portugal - Ethical Hacker

România - Ethical Hacker

Sverige - Ethical Hacker

Türkiye - Ethical Hacker

Malta - Ethical Hacker

Belgique - Ethical Hacker

France - Ethical Hacker

日本 - Ethical Hacker

Australia - Ethical Hacker

Malaysia - Ethical Hacker

New Zealand - Ethical Hacker

Philippines - Ethical Hacker

Singapore - Ethical Hacker

Thailand - Ethical Hacker

Vietnam - Ethical Hacker

India - Ethical Hacker

Argentina - Hacker Ètico

Chile - Hacker Ètico

Costa Rica - Hacker Ètico

Ecuador - Hacker Ètico

Guatemala - Hacker Ètico

Colombia - Hacker Ètico

México - Hacker Ètico

Panama - Hacker Ètico

Peru - Hacker Ètico

Uruguay - Hacker Ètico

Venezuela - Hacker Ètico

Polska - Ethical Hacker

United Kingdom - Ethical Hacker

South Korea - Ethical Hacker

Pakistan - Ethical Hacker

Sri Lanka - Ethical Hacker

Bulgaria - Ethical Hacker

Bolivia - Hacker Ètico

Indonesia - Ethical Hacker

Kazakhstan - Ethical Hacker

Moldova - Ethical Hacker

Slovenia - Ethical Hacker

Croatia - Ethical Hacker

Serbia - Ethical Hacker

Bhutan - Ethical Hacker

Nepal - Ethical Hacker

Uzbekistan - Ethical Hacker