Certified Ethical Hacking Training - Learn Ethical Hacking
Course
In Cardiff
Description
-
Type
Course
-
Location
Cardiff (Wales)
-
Duration
5 Days
-
Start date
Different dates available
Delegate pack consisting of course notes and exercises Manual Experienced Instructor Refreshments
Facilities
Location
Start date
Start date
Reviews
This centre's achievements
All courses are up to date
The average rating is higher than 3.7
More than 50 reviews in the last 12 months
This centre has featured on Emagister for 8 years
Subjects
- Management
- Security
- IT
- Network
- Hacking
- Web
- Engineering
- IT Security
- Network Training
- IT Management
Course programme
Introduction
This course will provide delegates with the knowledge of many different types fo hacking and how to prevent hackers from gaining unauthorised into computer network infrastructures. The course will cover important elements such as incident management, enumeration, DNS poisoning, social engineering, and denial of service, mobile device management and web app concepts in order for the delegate to gain a full understanding of ethical hacking.
Pre-Requisites
- Delegates must have sufficient experience in Network security administration as well as an MCSE or CCNA or equivalent before attending this course.
Who should attend?
- This course is aimed at delegates within a profession where network infrastructure is a concern, such as security officers, auditors, site administrators and security professionals.
What will you learn?
After attending the ethical hacking course you will understand:
- Cloud computing technology
- Countermeasures
- Mobile platform and tablet computer hacking
- Penetration testing methodology
- How to use Heartbleed
- Cryptography
- How to address existing threats to an infrastructure
Course Outline
- Overview of Information security
- Threats and attack vectors
- Hacking types, phases and concepts
- Incident management
- Physical security
- Information security controls
- Footprinting concepts and methodology
- Countermeasures and tools of foot printing
- Network scanning
- Enumeration concepts
- NetBIOS, SNMP, LDAP Enumeration
- Enumeration countermeasures
- System hacking steps and methodology
- Covering tracks
- Hiding files
- Malware threats
- Trojan types
- Concepts of virus’ and worms
- Anti-malware software
- Sniffing tools and detection
- Spoofing attack
- DNS poisoning
- Using Wireshark
- Social engineering concepts and techniques
- Social networking impersonation
- Identity theft
- Countermeasures for social engineering
- Denial of service
- Session hijacking concepts and tools
- Webserver attack concepts and tools
- Web App concepts and tools
- Web App threats
- SQL Injection concepts and tools
- Evasion techniques
- Wireless encryption
- Wireless hacking methodology
- Mobile platform attack vectors
- Attacking iOS, Android, Windows, Blackberry
- Mobile device management
- Evading IDS, Firewalls, Honeypots
- Detecting Honeypots
- Cloud threats and attacks
- Cryptography tools and concepts
- Email encryption
- Disk encryption
- Public key infrastructure
Additional information
- Gain an understanding of network scanning
- Learn the key aspects of enumeration
- Develop knowledge of malware threats and system hacking
- GUARANTEED LOWEST PRICE IN THE INDUSTRY
- Courses delivered by world class training instructors
- Training provided in luxury venues
- Includes material and manuals
- Book Online or Call 01344 203999 to speak to a training advisor today
Certified Ethical Hacking Training - Learn Ethical Hacking