Course Outline
Module 1: Introduction to Ethical Hacking
Module 2: Footprinting and Reconnaissance
Module 3: Scanning Networks
Module 4: Enumeration
Module 5: System Hacking
Module 6: Trojans and Backdoors
Module 7: Viruses and Worms
Module 8: Sniffers
Module 9: Social Engineering
Module 10: Denial of Service
Module 11: Session Hijacking
Module 12: Hacking Webservers
Module 13: Hacking Web applications
Module 14: SQL Injection
Module 15: Hacking Wireless Networks(theory or practice based on mode of delivery)
Module 16: Hacking Mobile Platforms
Module 17: Evading IDS, Firewalls and Honeypots
Module 18: Buffer Overflow
Module 19: Cryptography
Module 20: Penetration Testing
Requirements
There are no specific requirements needed to attend this course.
Testimonials (5)
Hazem has a very recent experience passing the exam and knows the gotchas and the way how ISC structures their questions.
Ivan - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Certified Information System Security Professional (CISSP) CBK Review
Pentester skills what demonstrate teacher
Oleksii Adamovych - EY GLOBAL SERVICES (POLAND) SP Z O O
Course - Ethical Hacker
The way to receive the information from the trainer
Mohamed Romdhani - Shams Power
Course - CISM - Certified Information Security Manager
See live real-time implementation of activities using sample application investigation/cracking tools.
Paweł - Ośrodek Przetwarzania Informacji – Państwowy Instytut Badawczy
Machine Translated
conforme con la forma de explicar del instructor