Ethical Hacking Training Course

30 HRS

Ethical Hacking Training Course

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Dierent types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sning techniques and how to defend against sning
  • Social Engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Various types of footprinting, footprinting tools, and countermeasures
  • Enumeration techniques and enumeration countermeasures
  • Session hijacking techniques and countermeasures
  • Dierent types of webserver attacks, attack methodology, and countermeasures
  • Dierent types of web application attacks, web application hacking methodology, and countermeasures
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Various cloud computing concepts, threats, attacks, and security techniques and tools
  • Dierent types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap