You are here: Home Courses and Certifications Information Security Courses

Harmony Solutions

Slideshow Image 1
Slideshow Image 2
Slideshow Image 3
Slideshow Image 4
Slideshow Image 5
Slideshow Image 6

EC-Council - Ethical Hacking

 

Overview

To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in to master the hacking technologies. To think like a hacker, you need to be one!

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.

 
Course Content

1. Introduction to Ethical Hacking

2. Foot printing and Reconnaissance

3. Scanning Networks

4. Enumeration

5. System Hacking

6. Trojans and Backdoors

7. Viruses and Worms

8. Sniffers

9. Social Engineering

10. Denial of Service

11. Session Hijacking

12. Hacking Web servers

13. Hacking Web Applications

14. SQL Injection

15. Hacking Wireless Networks

16. Hacking Mobile Platforms

17. Evading IDS, Firewalls and Honey pots

18. Buffer Overflows

19. Cryptography

20. Penetration Testing

 
Course Dates

20 Aug 2018 to 24 Aug 2018 - EC-Council - Ethical Hacking - Nairobi

 

 

Upcoming Courses

Certified Information System Auditor (CISA)
08 Oct 2018 to 12 Oct 2018
Certified Information System Security Professional (CISSP)
24 Sep 2018 to 28 Sep 2018
EC-Council - Ethical Hacking
20 Aug 2018 to 24 Aug 2018
Computer Hacking Forensics Investigator (CHFI)
17 Sep 2018 to 21 Sep 2018