You are here: Home Courses and Certifications Information Security Courses

Harmony Solutions

Slideshow Image 1
Slideshow Image 2
Slideshow Image 3
Slideshow Image 4

EC-Council - Ethical Hacking

 

Overview

To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in to master the hacking technologies. To think like a hacker, you need to be one!

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.

 
Course Content

1. Introduction to Ethical Hacking

2. Foot printing and Reconnaissance

3. Scanning Networks

4. Enumeration

5. System Hacking

6. Trojans and Backdoors

7. Viruses and Worms

8. Sniffers

9. Social Engineering

10. Denial of Service

11. Session Hijacking

12. Hacking Web servers

13. Hacking Web Applications

14. SQL Injection

15. Hacking Wireless Networks

16. Hacking Mobile Platforms

17. Evading IDS, Firewalls and Honey pots

18. Buffer Overflows

19. Cryptography

20. Penetration Testing

 
Course Dates

19 Feb 2018 to 23 Feb 2018 - EC-Council - Ethical Hacking - Nairobi