ETHICAL HACKING & Countermeasures
The goal of the Ethical Hacking Course is to teach training participants how to take proactive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. Training class is designed to give you the skills to perform vulnerability assessment, penetration tests and security audits. With practical experience and hands on scenarios, you’ll gain the expertise needed to stop waiting for attacks and learn how to find vulnerabilities before the hackers do. Stop waiting until problems happen to react. Learn how to test and assess your network’s infrastructure and system controls in a systematic and consistent way.
Who Should Attend?
- University Students pursing BSCS/BCIT/MCS/MIT/MSCS/MSIS or equivalent.
- Anyone who is concerned about the security of network infrastructure
- Penetration Testers / Vulnerability Assessors
- Network Administrators / Engineers
- System Administrator
- Network Security Professionals
- IT Officers / Managers
- Telecom Engineers
- Manager Network Operations
- IT Auditors
- Introduction to Ethical Hacking
- Hacking Laws, Footprinting, Google Hacking
- Scanning, Enumeration, System Hacking
- Trojans and Backdoors, Viruses and Worms, Sniffers
- Social Engineering, Phishing
- Hacking Email Accounts, Denial of Service
- Session Hijacking, Hacking Web Servers
- Web Application Vulnerabilities
- Web-based Password Cracking Techniques
- Hacking Routers, Cable Modems and Firewalls
- Hacking Mobile Phones, PDA and Handheld Devices
- Evading IDS, Firewalls, and Honeypots
- Web Application Security, SQL Injection
- Hacking Wireless Networks, Physical Security
- Linux Hacking, Buffer Overflows, Cryptography, Penetration Testing, MAC OS X Hacking
- Bluetooth Hacking, VoIP Hacking
Cybersecurity Essentials covers foundation knowledge and essentials skills in all security domains in the cyber world – information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defense and mitigation techniques use in protecting businesses.
High school and higher education students interested in learning about foundational knowledge and build essential skills in cyber security, and career opportunities in the cyber security field.
Who should attend?
Seventy-five percent of the course is geared toward providing a basic framework for professionals making cybersecurity decisions in industry and government and individuals seeking to immerse themselves in the pressing issues of cybersecurity, giving them the information they need to make the best decisions for the defense of their organizations. About a quarter of the course covers more technical areas of interest to people with more engineering-focused backgrounds, such as software developers or those working in digital forensics. Although those with a computing background would be better prepared for the more technical topics, an engineering or computing background is not required to benefit from any of the sessions.
- Cybersecurity-World of Wizards, Heroes & Criminals
- Cybersecurity Threats, Vulnerabilities, and Attacks
- Joining the Order of Cybersecurity Specialists
- The Cybersecurity Sorcery Cube
- The Art of Protecting Secrets
- The Art of Ensuring Integrity
- The Realm of Five Nines
- Fortifying the Kingdom
2 Months, 3 Days / Week,
1.5 Hrs / Day
Every Monday & Thursday
9am to 9pm (Flexible Hrs)