Ethical Hacking

In order to prevent a hacker from accessing your users, you have to know their tricks. Most Ethical Hackers become highly adept at detecting and thwarting security threats - preventing significant harm to your business and making you an incredible asset! You can also use your new skills to move into the field of penetration testing.

Donwload Course Outline


Warning: Undefined variable $start_datetime in /home/clients/3f900ab883e7060acd0b6e3fddb74ae6/web/wp-content/themes/university/u-course/single-course-meta.php on line 30
DURATION:
2 months

Address

Admin Telecom Academy   View map

Categories

Course , Study

This training will show you just how important it is to know thy enemy.

You’ll see

How frightening it is for your system to be hacked into easily.
How easy it can be for a hacker to elevate their privilege and quickly “own” a machine.

You’ll learn

How easy it can be to crack passwords – even those that would have been considered “secure.”

How hackers create the dreaded Trojans that can potentially infect the computer of an unsuspecting user and how they take control of the machine to infiltrate networks.

Why will we teach you these things?

The answer is very simple: In order to prevent a hacker from accessing your users, you have to know their tricks.

Most Ethical Hackers become highly adept at detecting and thwarting security threats – preventing significant harm to your business and making you an incredible asset! You can also use your new skills to move into the field of penetration testing.

Audience
IT and Telecom professional interested in upgrading their skills on computer and network security 

Prerequisites
This course is open to who want to learn it but, knowledge in computer system administration, networking and programming will be of good help 

 

COURSE OUTLINE

  • Introduction to Ethical Hacking
  • VMWare and Linux
  • Footprinting and Reconnaissance
  • Scanning Part
  • Enumeration
  • Passwords Windows and Linux
  • System Hacking
  • Malware
  • Hack-O-Rama
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Web and SQL Hacking
  • Cryptography
  • Intrusion Detection Systems
  • Hacking Wireless Networks