If you’re concerned about the integrity of your network’s infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. By scanning and attacking your own network (no real networks will be harmed), you’ll also learn how intruders operate and the steps to secure a system.
In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.
LEARNING OUTCOMES:
- Footprinting
- Network scanning
- Enumeration
- Packet sniffing
- Social Engineering
- DoS/DDoS
- Session hijacking
- Webserver and web application attacks and countermeasures
- SQL injection attacks
- Wireless encryption
TOPICS INCLUDE:
1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Malware Threats 7. Sniffing 8. Social Engineering 9. Denial of Service 10. Session Hijacking 11. Hacking Webservers 12. Hacking Web Applications 13. SQL Injection 14. Hacking Wireless Networks 15. Hacking Mobile Platforms 16. Evading IDS, Firewalls, and Honeypots 17. Cloud Computing 18. Cryptography
- Cloud computing threats
- Cryptography ciphers
- Penetration testing
DURATION: 3 DAYS
PRICE: $2,499 per participant