Cyber Security

The goal of the Ethical Hacking Course is to teach training participants how to take proactive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. Training class is designed to give you the skills to perform vulnerability assessment, penetration tests and security audits. With practical experience and hands on scenarios, you’ll gain the expertise needed to stop waiting for attacks and learn how to find vulnerabilities before the hackers do. Stop waiting until problems happen to react. Learn how to test and assess your network’s infrastructure and system controls in a systematic and consistent way.

Who Should Attend?

The course is purely technical and applied in nature and is targeted at professionals serving in following roles:

  • University Students pursing BSCS/BCIT/MCS/MIT/MSCS/MSIS or equivalent.
  • Network Administrators / Engineers
  • System Administrator
  • Network Security Professionals
  • IT Officers / Managers
  • Telecom Engineers
  • Manager Network Operations
  • IT Auditors
  • Penetration Testers / Vulnerability Assessors
  • Anyone who is concerned about the security of network infrastructure

What will you learn after this course?

  • You will gain the in-demand career skills of a professional security tester. Learn the methodologies, tools, and manual hacking techniques used by penetration testers.
  • You will seek hands-on hacking skills in our lab that are difficult to gain in a corporate or government working environment.
  • You will move beyond automated vulnerability scans and simple security testing into the world of ethical penetration testing and hacking.
  • You will learn more than interesting theories and lecture with examples from practical scenarios and experiences of trainer

Course Contents

  • Introduction to Ethical Hacking
  • Hacking Laws
  • Footprinting
  • Google Hacking
  • Scanning
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Phishing
  • Hacking Email Accounts
  • Denial of Service
  • Session Hijacking
  • Hacking Web Servers
  • Web Application Vulnerabilities
  • Web-based Password Cracking Techniques
  • Web Application Security
  • SQL Injection
  • Hacking Wireless Networks
  • Physical Security
  • Linux Hacking
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing
  • MAC OS X Hacking
  • Hacking Routers, Cable Modems and Firewalls
  • Hacking Mobile Phones, PDA and Handheld Devices
  • Bluetooth Hacking
  • VoIP Hacking