This cyber security course immerses the students into an interactive environment where they are shown how to scan, test, hack and secure their own systems - ethically. The lab intensive environment gives each student in-depth knowledge and practical experience with the
current essential cyber security systems. Students begin by understanding how perimeter defences work and how to scan and attack their own networks, no real network is harmed. Finally, students then learn how intruders escalate privileges and what steps can be taken to secure a system.
- Introduction to Ethical Hacking
- Footprinting and reconnaissance
- Scanning networks
- System hacking
- Trojans and backdoors
- Viruses and worms
- Social engineering
- Denial of Service (DoS)
- Session hijacking
- Hijacking webservers
- Hacking web applications
- SQL injection
- Hacking wireless networks
- Evading IDS firewalls and honeypots
- Buffer overflow
- Penetration testing
- Knowledge of TCP/IP
- Basic knowledge of Information Systems
- Basic knowledge of Networking
Who is it for?
- IT Security Officers
- Security professionals
- Site Administrators
- Anyone who is concerned about the integrity of the network infrastructure
What is in it for you?
By the end of this course, students would be able to understand:
- Key issues plaguing the information security world, incident management process, and penetration testing
- Various types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Different types of Trojans, Trojan analysis, and Trojan countermeasures
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
- Packet sniffing techniques and how to defend against sniffing
- Social engineering techniques, identify theft, and social engineering countermeasures
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
- Session hijacking techniques and countermeasures
- Different types of webserver attacks, attack methodology, and countermeasures
Your next steps?
Computer Hacking Forensics Investigator (CHFI)
- On-site training (at your premises) for groups of 10 or more may be offered at no extra cost.
- Flexible session formats and dates for groups of 10 or more.
- Air-conditioned Facilities.
- Course Material is provided.
- Meals and Refreshments (where applicable
Mondays and Thursdays
17:30 - 20:30
||PwC's Academy, Mill Street, Qormi