EC-Council - Ethical Hacking and Countermeasures
Starting dates and places
Description
Prerequisites:
This course will significantly benefit security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.Not anyone can be a student ?¢‚ÄöᮂÄöÑπ the Accredited Training Centres (ATC) will make sure the applicants work for legitimate companies
Course Description:
Hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must adopt the approach of 'defence in depth'. In other words, they must penetrate their …
Frequently asked questions
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Prerequisites:
This course will significantly benefit security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.Not anyone can be a student ?¢‚ÄöᮂÄöÑπ the Accredited Training Centres (ATC) will make sure the applicants work for legitimate companies
Course Description:
Hacking involves creativity and thinking 'out-of-the-box', then vulnerability testing and security audits will not ensure the security proofing of an organization. To ensure that organisations have adequately protected their information assets, they must adopt the approach of 'defence in depth'. In other words, they must penetrate their networks and assess the security posture for vulnerabilities and exposure.
The goal of the Ethical Hacking Course is to help the
organization take pre-emptive measures against malicious attacks by
attacking the system himself; all the while staying within legal
limits.
Students will be encouraged to experiment and explore in our
State-of-the-Labs in the knowledge that they will not compromise
their Organisations network. Delegates should be prepared for
action paced course and the sheer size of the course content,
however do not be intimidated as we will release e-learning prior
to the delegate attending the course and also the instructor will
prepare them thoroughly for the Certification Examination, the
maunuals can then be taken home and to work and can be used as
excellent reference volumes.
This course includes the following modules:
Course Topics
- Introduction to Ethical Hacking
- Footprinting
- Scanning
- Enumeration
- System Hacking
- Trojans and Backdoors
- Sniffers
- Denial of Service
- Social Engineering
- Session Hijacking
- Hacking Web Servers
- Web Application Vulnerabilities
- Web Based Password Cracking Techniques
- SQL Injection
- Hacking Wireless Networks
- Virus and Worms
- Physical Security
- Linux Hacking
- Evading Firewalls, IDS and Honeypots
- Buffer Overflows
- Cryptography
- Penetration Testing Course
- Advanced Exploit Writing
- Advanced Covert Hacking Techniques
- Advanced Virus Writing Techniques
- Advanced Reverse Engineering Techniques
For online live training advice please visit our Learning Advice Centre on our website. Be sure to follow us on Twitter to receive special course offers, news and updates!
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.