This specialist course deals with the method of operation and instruments used by modern hackers. The participants learn the mind-set and working methods of a hacker. In this way they are in a position to understand the individual processing phases of an attack. They learn to judge the threats posed by hackers and to recognize the weak points in company networks.
In particular, the participants learn how to use suitable defence measures against hackers.
Network administrators, system engineers, Security Officers
- Introduction to "Ethical Hacking"
- Footprinting
- Scanning
- Enumeration
- System Hacking
- Trojans and Backdoors
- Sniffers
- Denial of Service
- Social Engineering
- Session Hijacking
- Hacking Web Servers
- Web Application Vulnerabilities
- Web Based Password Cracking Techniques
- SQL Injection
- Hacking Wireless Networks
- Virus and Worms
- Physical Security
- Linux Hacking
- Evading Firewalls, IDS and Honeypots
Buffer Overflows- Cryptography
- Penetration Testing
5 days
The course is carried out as a combination of presentations and workshops. The individual modules are initiated by an introductory presentation. They are then extended by various "live" LABs.
The participants receive comprehensive documentation (original EC-Council courseware).
The course fees include this documentation, as well as refreshment during intervals, lunch and the exam voucher.
The course can also be carried out as an internal company course.
Please contact us for more information!
|