fbpx

Cyber Security

ETHICAL HACKING & Countermeasures

Course Contents

  • Introduction to Ethical Hacking
  • Hacking Laws, Footprinting, Google Hacking
  • Scanning, Enumeration, System Hacking
  • Trojans and Backdoors, Viruses and Worms, Sniffers
  • Social Engineering, Phishing
  • Hacking Email Accounts, Denial of Service
  • Session Hijacking, Hacking Web Servers
  • Web Application Vulnerabilities
  • Web-based Password Cracking Techniques
  • Hacking Routers, Cable Modems and Firewalls
  • Hacking Mobile Phones, PDA and Handheld Devices
  • Evading IDS, Firewalls, and Honeypots
  • Web Application Security, SQL Injection
  • Hacking Wireless Networks, Physical Security
  • Linux Hacking, Buffer Overflows, Cryptography,
  • Penetration Testing, MAC OS X Hacking
  • Bluetooth Hacking, VoIP Hacking

Who Should Attend?

University Students pursing BSCS/BCIT/MCS/MIT/MSCS/MSIS or equivalent. Anyone who is concerned about the security of network infrastructure, Penetration Testers / Vulnerability Assessors, Network Administrators / Engineers, System Administrator, Network Security Professionals, IT Officers / Managers, Telecom Engineers, Manager Network Operations, IT Auditors.

close-link