You are here: Home Courses and Certifications Information Security Courses

Harmony Solutions

Slideshow Image 1
Slideshow Image 2
Slideshow Image 3
Slideshow Image 4

EC-Council - Ethical Hacking

 

Overview

To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in to master the hacking technologies. To think like a hacker, you need to be one!

The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.

 
Course Content

1. Introduction to Ethical Hacking

2. Foot printing and Reconnaissance

3. Scanning Networks

4. Enumeration

5. System Hacking

6. Trojans and Backdoors

7. Viruses and Worms

8. Sniffers

9. Social Engineering

10. Denial of Service

11. Session Hijacking

12. Hacking Web servers

13. Hacking Web Applications

14. SQL Injection

15. Hacking Wireless Networks

16. Hacking Mobile Platforms

17. Evading IDS, Firewalls and Honey pots

18. Buffer Overflows

19. Cryptography

20. Penetration Testing

 
Course Dates

20 Nov 2017 to 24 Nov 2017 - EC-Council - Ethical Hacking - Nairobi

 

 

Upcoming Courses

Certified Information System Security Professional (CISSP)
27 Nov 2017 to 01 Dec 2017
Certified Information Security Manager (CISM)
13 Nov 2017 to 17 Nov 2017
EC-Council - Ethical Hacking
20 Nov 2017 to 24 Nov 2017
Computer Hacking Forensics Investigator (CHFI)
04 Dec 2017 to 08 Dec 2017