Ethical Hacking and Countermeasures
-
COURSE DATES AND LOCATIONS
DATE
Duration
LOCATION
FEES
Book Now
-
INTRODUCTION
Ethical Hacking and Countermeasures course is comprised of a broad base of topics in offensive network security, ethical hacking, and network defense and countermeasures.
The content of this course is designed to immerse the trainee into an interactive environment where they will be shown how to scan, test, hack and secure information systems.CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks.
-
COURSE OBJECTIVES
By the end of the course, you‘ll be able to:
- Prepare yourself for the Certified Ethical Hacker (CEH), Certified Penetration Tester (CPT), and Certified Penetration Testing Specialist (CPTS) certifications.
- Move beyond automated vulnerability scans and simple security testing into the world of ethical penetration testing and hacking.
- Gain the in-demand career skills of a professional security tester.
- Learn the methodologies, tools, and manual hacking techniques used by penetration testers with hands on lab exercises.
- Information security controls, laws, and standards
- Various types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
-
COURSE AUDIENCE
This course is made for :
- Security engineers
- Penetration testers
- Ethical hackers
- Security auditors
- Mid-Level Information Security Auditor
- Cybersecurity Auditor
- Security Administrator
- IT Security Administrator
- Cyber Defense Analyst
- Vulnerability Assessment Analyst
- Warning Analyst
- Any security related personnel whose job involves assessing target networks and systems to find security vulnerabilities.
- This course will also help prepare for the following certificate CEH, CPT, and CPTS.
-
COURSE OUTLINE
Day One
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
Day Two
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffers
Day Three
- Social Engineering
- Denial of Service
- Session Hijacking
- Hacking Webservers
Day Four
- Hacking Web applications
- SQL Injection
- Hacking Wireless Networks(theory or practice based on mode of delivery)
- Hacking Mobile Platforms
Day Five
- Evading IDS, Firewalls and Honeypots
- Buffer Overflow
- Cryptography
- Penetration Testing
Keyword
Training Subject
Training Location