Computer Hacker Professional Package

Course

Online

Save 80%
£ 200 VAT inc.

Description

  • Type

    Course

  • Level

    Intermediate

  • Methodology

    Online

  • Class hours

    100h

  • Duration

    1 Year

  • Start date

    Different dates available

  • Online campus

    Yes

  • Support service

    Yes

  • Virtual classes

    Yes

Master the skills of hacking and penetration to help improve corporate IT security with this comprehensive bundle of courses. This course includes all the materials and exercises required to obtain the following industry-recognised qualifications:
Certified Ethical Hacker.
Computer Hacking Forensics Investigator.
Certified Information Security Manager (CISM).
Certified Information Systems Auditor (CISA).
Certified Information Systems Security Professional (CISSP).

Facilities

Location

Start date

Online

Start date

Different dates availableEnrolment now open

About this course

Using enumeration to catalogue system resources and potential routes to breach.
Automated tools for breaching security including Trojans, backdoors, viruses, worms and Denial of Service (DOS) attacks
The role of social engineering to steal confidential information directly from employees
Using sniffers and session hijacking to mask illegal access to system resources
Web-based attacks that can take online systems down.
How wireless network security can be breached.
How hackers avoid protective measures like IDS, firewalls and honeypots.
Using cryptography and steganography to protect data.
How to use the Metasploit toolkit to assess network protection measures and apply fixes where appropriate

Network engineers and IT security professionals who need to understand hacking techniques so that they can better protect resources.
Network engineers and IT security professionals responsible for investigating network perimeter breaches and data theft incidents.
IT professionals who need to earn the certification to prove their experience in the field of network security.
IT and network security professionals who need an industry-recognised qualification to prove their knowledge and experience.
Any individual interested in making a career move into an IT security role.

A deeper understanding of network security, backed by the skills to improve their own systems.
A comprehensive suite of skills that ensures they are more productive and efficient at work.
The necessary knowledge to take on new responsibilities and secure promotions within the IT security team.
Well-regarded practical skills that are in-demand worldwide, creating many new employment opportunities.
The Computer Hacker Professional Package is an extremely cost-effective way for learners to acquire all the practical skills and knowledge. This course contains everything needed to join the world’s elite IT security specialists.

Questions & Answers

Add your question

Our advisors and other users will be able to reply to you

Who would you like to address this question to?

Fill in your details to get a reply

We will only publish your name and question

Reviews

Subjects

  • Hacker
  • Systems
  • Security Manager
  • Footprinting
  • Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Backdoors
  • Viruses & Worms
  • Trojans
  • Service
  • Social Engineering

Course programme

Units of Study

Certified Ethical Hacker
  • Intro to course
  • Footprinting & Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans & Backdoors
  • Viruses & Worms
  • Denial of Service
  • Social Engineering
  • Sniffers
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls & Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing
Computer Hacking Forensic Investigator
  • Computer Forensics Introduction
  • Forensics Investigation Process
  • Searching and Seizing
  • Digital Evidence
  • First Responder Procedures
  • Forensics Lab
  • Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Partitions
  • Using Access Data FTK
  • Using EnCase
  • Steganography
  • Password Crackers
  • Log Correlation
  • Network Forensics
  • Wireless Attacks
  • Web Attacks
  • Email Crimes
  • Mobile Investigation
  • Investigative Reports
  • Expert Witness
Certified Information Security Manager (CISM)
  • Information Security Governance
  • Risk Management
  • Information Security Program
  • Information Security Program Implementation
  • Information Security Program Management
  • Incident Management and Response
Certified Information Systems Auditor (CISA)
  • Lesson 1
  • Lesson 2
  • Lesson 3
  • Lesson 4
  • Lesson 5
  • Lesson 6
  • Lesson 7
Certified Information Systems Security Pro (CISSP)

Computer Hacker Professional Package

£ 200 VAT inc.