top of page

Computer Technology

   >

Computer Technology 

   >

Ethical Hacking and Countermeasures

Ethical Hacking and Countermeasures

Duration (Days)

5

Overview

This course is designed to help participants to understand how perimeter defences work and how to take steps to secure a system. They will learn intrusion detection, policy creation, social engineering, DDoS attacks, virus creation and buffer overflows.

Objectives
  • Understand perimeter defences

  • Learn about intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows and virus creation

  • Experience ethical hacking

  • Prepare for EC Council Certified Ethical Hacker exam 312-50

Course Outline
  • Ethical hacking

  • Foot printing and reconnaissance

  • Scanning network

  • Enumeration

  • System hacking

  • Trojans

  • Backdoors

  • Viruses

  • Sniffers

  • Social engineering

  • Session hijacking

  • SQL injection

  • Hacking wireless network

  • Evading IDS, firewalls and honeypots

  • Buffer overflow

  • Cryptography

  • Penetration testing

bottom of page