Computer Technology
Ethical Hacking and Countermeasures
Duration (Days)
5
Overview
This course is designed to help participants to understand how perimeter defences work and how to take steps to secure a system. They will learn intrusion detection, policy creation, social engineering, DDoS attacks, virus creation and buffer overflows.
Objectives
-
Understand perimeter defences
-
Learn about intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation
-
Experience ethical hacking
-
Prepare for EC Council Certified Ethical Hacker exam 312-50
Course Outline
-
Ethical hacking
-
Foot printing and reconnaissance
-
Scanning network
-
Enumeration
-
System hacking
-
Trojans
-
Backdoors
-
Viruses
-
Sniffers
-
Social engineering
-
Session hijacking
-
SQL injection
-
Hacking wireless network
-
Evading IDS, firewalls and honeypots
-
Buffer overflow
-
Cryptography
-
Penetration testing