ETHICAL HACKING & Countermeasures
Course Contents
- Introduction to Ethical Hacking
- Hacking Laws, Footprinting, Google Hacking
- Scanning, Enumeration, System Hacking
- Trojans and Backdoors, Viruses and Worms, Sniffers
- Social Engineering, Phishing
- Hacking Email Accounts, Denial of Service
- Session Hijacking, Hacking Web Servers
- Web Application Vulnerabilities
- Web-based Password Cracking Techniques
- Hacking Routers, Cable Modems and Firewalls
- Hacking Mobile Phones, PDA and Handheld Devices
- Evading IDS, Firewalls, and Honeypots
- Web Application Security, SQL Injection
- Hacking Wireless Networks, Physical Security
- Linux Hacking, Buffer Overflows, Cryptography,
- Penetration Testing, MAC OS X Hacking
- Bluetooth Hacking, VoIP Hacking
Who Should Attend?
University Students pursing BSCS/BCIT/MCS/MIT/MSCS/MSIS or equivalent. Anyone who is concerned about the security of network infrastructure, Penetration Testers / Vulnerability Assessors, Network Administrators / Engineers, System Administrator, Network Security Professionals, IT Officers / Managers, Telecom Engineers, Manager Network Operations, IT Auditors.