Clicky

Certified Ethical Hacker

Audit
Certifying Body: EC-Council
Industry: IT Security
Department: IT

Course Overview:

This cyber security course immerses the students into an interactive environment where they are shown how to scan, test, hack and secure their own systems - ethically. The lab intensive environment gives each student in-depth knowledge and practical experience with the
current essential cyber security systems. Students begin by understanding how perimeter defences work and how to scan and attack their own networks, no real network is harmed. Finally, students then learn how intruders escalate privileges and what steps can be taken to secure a system.

Course Topics

  • Introduction to Ethical Hacking
  • Footprinting and reconnaissance
  • Scanning networks
  • Enumeration
  • System hacking
  • Trojans and backdoors
  • Viruses and worms
  • Sniffers
  • Social engineering
  • Denial of Service (DoS)
  • Session hijacking
  • Hijacking webservers
  • Hacking web applications
  • SQL injection
  • Hacking wireless networks
  • Evading IDS firewalls and honeypots
  • Buffer overflow
  • Cryptography
  • Penetration testing

Pre-requisites

  • Knowledge of TCP/IP
  • Basic knowledge of Information Systems
  • Basic knowledge of Networking

Who is it for?

  • IT Security Officers
  • Auditors
  • Security professionals
  • Site Administrators
  • Anyone who is concerned about the integrity of the network infrastructure

What is in it for you?

    By the end of this course, students would be able to understand:
  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and countermeasures

Your next steps?

Computer Hacking Forensics Investigator (CHFI)

Classroom

  • Course material is provided
  • Flexible session scheduling and formats
  • Facilities are air-conditioned
  • Meals and refreshments are included when applicable
  • We can also offer on-site training
  • Group of 5 or more benefit from discounts

 

Mondays and Thursdays   17:30 - 20:30  
Venue: PwC's Academy, Mill Street, Qormi

Contact Us

  • Facebook
  • Linkedin
  • Twitter
  • Google+