What are the objectives of this course?
The knowledge gained in this course can help you to harden defenses and reduce the risk of compromise, saving time and money that would otherwise be spent recovering from a security breach in a corporate environment.
- Intro to course
- Footprinting & Reconnaissance
- Scanning Networks
- System Hacking
- Trojans & Backdoors
- Viruses & Worms
- Denial of Service
- Social Engineering
- Session Hijacking
- Hacking Web servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Evading IDS, Firewalls & Honeypots
- Buffer Overflows
- Penetration Testing
Who is it intended for?
This course is for anyone who is looking to learn the skills and techniques required to make a change into IT security, or any network/security professionals who need a better understanding of hacking techniques.
There are no pre-requisites for this course.
What marks this course apart?
Once you have completed this course you will be able to sit the Certified Ethical Hacking Certification 312-50 examination. Students will be able to function in roles such as ethical hacker, cybersecurity and penetration tester.
What happens after requesting information?
Once you have enquired you will be contacted by one of our specialist careers advisors who will be able to provide you with any further information you require.
This school offers programs in:
Last updated February 17, 2018