Cyber Security

ETHICAL HACKING & Countermeasures

Course Contents

  • Introduction to Ethical Hacking
  • Hacking Laws, Footprinting, Google Hacking
  • Scanning, Enumeration, System Hacking
  • Trojans and Backdoors, Viruses and Worms, Sniffers
  • Social Engineering, Phishing
  • Hacking Email Accounts, Denial of Service
  • Session Hijacking, Hacking Web Servers
  • Web Application Vulnerabilities
  • Web-based Password Cracking Techniques
  • Hacking Routers, Cable Modems and Firewalls
  • Hacking Mobile Phones, PDA and Handheld Devices
  • Evading IDS, Firewalls, and Honeypots
  • Web Application Security, SQL Injection
  • Hacking Wireless Networks, Physical Security
  • Linux Hacking, Buffer Overflows, Cryptography,
  • Penetration Testing, MAC OS X Hacking
  • Bluetooth Hacking, VoIP Hacking

Who Should Attend?

University Students pursing BSCS/BCIT/MCS/MIT/MSCS/MSIS or equivalent. Anyone who is concerned about the security of network infrastructure, Penetration Testers / Vulnerability Assessors, Network Administrators / Engineers, System Administrator, Network Security Professionals, IT Officers / Managers, Telecom Engineers, Manager Network Operations, IT Auditors.

Covid-19 Alert 😷Nicon Offer's E-Learning Platform

Because of the coronavirus (Covid-19) outbreak, GOVT is going to enable lockdown again all institute were closed until further notice.

However, NICON is available as usual with our e-Learning service.

For e-Learning kindly register with NICON E-LEARNING SYSTEMS.