Ethical Hacking

This course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies.

Participants will begin by understanding how perimeter defenses work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system.

Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation.

This course will prepare all participants wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

Awarding Body

London Institute of
Business & Technology

Duration

5 Days
25 Hours

Start Date

All Year Around

Study Mode

Classroom OR
Distance Learning

By the end of this programme, the participant will be able to:

  • Describe how perimeter defenses function by ethically scanning and attacking networks
  • Conduct information systems security audits by understanding the latest security threats, advanced attack vectors, hacking techniques, methodologies and security measures
  • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
  • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
  • Create policies and apply countermeasures against social engineering, Distributed Denial-ofService (DDoS) attacks, buffer overflows, and virus creation
  • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers
  • Introduction to Ethical Hacking
    • Short History of hacking
    • Current developments
    • Evolution and growth
    • What is an “Ethical” Hacker
    • Types of hackers
    • Hacking methodologies
    • Key issues plaguing the information security world
    • Penetration testing
    • System fundamentals
    • Incident management processes
  • Identifying the systems at risk
    • Wireless networking
    • Mobile platform security guidelines
    • Mobile platform security tools
    • Web servers
    • Web applications
    • Footprinting tools
    • Footprinting reconnaissance
    • Scanning networks
    • Enumeration of services
  • System hacking techniques and countermeasures
    • Types of Trojans
    • Working of viruses
    • Computer worms
    • Covert channels
    • Sniffers
    • Social engineering
    • Denial of Service (DoS)
    • Cryptography
    • Public Key Infrastructure (PKI)
    • Cryptanalysis tools
  • Hacking your own system
    • Gaining access to a system
    • Session hijacking
    • Wireless hacking tools
    • Hacking mobile platforms
    • Structured Query Language (SQL) injection
    • Evading an Intrusion Detection System (IDS)
    • Firewalls
    • Honeypots
  • Penetration testing
    • Types of penetration testing
    • Vulnerability assessment
    • Penetration testing roadmap

IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

5-day training programme – 1,790 USD

How many students are there in a classroom?

It depends on how many would enroll per intake. Even if the number of students are just 1, we still continue with the training as planned. The maximum number of students we will have in a classroom is 10.

Can I request a date that is convenient for me?

Absolutely! We will arrange the training that is convenient for you. The training date is completely customizable.

Can I change the course content?

Yes, if the contents of the course needs to be changed, please let us know. We will communicate with you and get a course outline that works for you finalized.

Does it matter which industry I work at?

It really doesn’t. We take cases and discuss them to cover your industry. If you need the course to be customized and tailored to your industry, we can also do that. You’d have to let us know in advance by filling out the form below.

How many students are there in a classroom?

It depends on how many would enroll per intake. Even if the number of students are just 1, we still continue with the training as planned. The maximum number of students we will have in a classroom is 10.

(The fees include coffee breaks, study materials and working lunches daily)

Request More Information & Brochure

2 to 5-Day Training Programes NEW
Explore over 50+ corporate training programmes for executives conducted by industry experts!
EXPLORE