Ethical Hacking / Cyber Security

Ethical Hacking & Countermeasures

The goal of the Ethical Hacking Course is to teach training participants how to take proactive measures against malicious attacks by attacking the system himself; all the while staying within legal limits. Training class is designed to give you the skills to perform vulnerability assessment, penetration tests and security audits. With practical experience and hands on scenarios, you’ll gain the expertise  needed to stop waiting for attacks and learn how to find vulnerabilities before the hackers do. Stop waiting until problems happen to react. Learn how to test and assess your network’s infrastructure and system controls in a systematic and consistent way.

Who Should Attend?

  • University Students pursing BSCS/BCIT/MCS/MIT/MSCS/MSIS or equivalent.
  • Anyone who is concerned about the security of network infrastructure
  • Penetration Testers / Vulnerability Assessors
  • Network Administrators / Engineers
  • System Administrator
  • Network Security Professionals
  • IT Officers / Managers
  • Telecom Engineers
  • Manager Network Operations
  • IT Auditors

Course Contents

  • Introduction to Ethical Hacking
  • Hacking Laws, Footprinting, Google Hacking
  • Scanning, Enumeration, System Hacking
  • Trojans and Backdoors, Viruses and Worms, Sniffers
  • Social Engineering, Phishing
  • Hacking Email Accounts, Denial of Service
  • Session Hijacking, Hacking Web Servers
  • Web Application Vulnerabilities
  • Web-based Password Cracking Techniques
  • Hacking Routers, Cable Modems and Firewalls
  • Hacking Mobile Phones, PDA and Handheld Devices
  • Evading IDS, Firewalls, and Honeypots
  • Web Application Security, SQL Injection
  • Hacking Wireless Networks, Physical Security
  • Linux Hacking, Buffer Overflows, Cryptography, Penetration Testing, MAC OS X Hacking
  • Bluetooth Hacking, VoIP Hacking

Cyber Security

Cybersecurity Essentials covers foundation knowledge and essentials skills in all security domains in the cyber world – information security, systems security, network security, mobile security, physical security, ethics and laws, related technologies, defense and mitigation techniques use in protecting businesses.

Course Benefit

High school and higher education students interested in learning about foundational knowledge and build essential skills in cyber security, and career opportunities in the cyber security field.

Who should attend?

Seventy-five percent of the course is geared toward providing a basic framework for professionals making cybersecurity decisions in industry and government and individuals seeking to immerse themselves in the pressing issues of cybersecurity, giving them the information they need to make the best decisions for the defense of their organizations. About a quarter of the course covers more technical areas of interest to people with more engineering-focused backgrounds, such as software developers or those working in digital forensics. Although those with a computing background would be better prepared for the more technical topics, an engineering or computing background is not required to benefit from any of the sessions.

Course Contents

  • Cybersecurity-World of Wizards, Heroes & Criminals
  • Cybersecurity Threats, Vulnerabilities, and Attacks
  • Joining the Order of Cybersecurity Specialists
  • The Cybersecurity Sorcery Cube
  • The Art of Protecting Secrets
  • The Art of Ensuring Integrity
  • The Realm of Five Nines
  • Fortifying the Kingdom

Course Details

2 Months, 3 Days / Week,
1.5 Hrs / Day
Every Monday & Thursday
9am to 9pm (Flexible Hrs)

Karyawan Muda Raup 20 Juta dari Black Scatter Rahasia Tips Trik analisis pola spin gates of olympus hendra senyum bapak sebelah nemuin keseruan mahjong ways malam minggu bocoran pola mahjong ways anto supir grab setiap pagi bu rina guru sd ketagihan pola scatter gates of olympus cerita mas agus tiap malam main mahjong ways dino tukang service hp hobi analisis gates of olympus filosofi main mahjong ways pak karno tukang bakso kisah ibu tini pedagang sayur jago baca pola gates of olympus mas fajar ngitung peluang mahjong ways dari pengalaman mbak dewi karyawati main gates of olympus jam istirahat nina desainer freelance cek pola gates of olympus pagi pak budi sopir angkot nemuin pola mahjong ways pak santoso pelajari ritme mahjong ways sambil ngopi pak tarno pensiunan pns lebih milih mahjong ways pengalaman pertama mas yoga main gates of olympus ketagihan perjalanan eko fasih baca pola mahjong ways gates of olympus rizal anak kuliah iseng coba mahjong ways nagih siti penasaran mahjong ways kini paham polanya warung kopi pak madi basecamp diskusi pola mahjong ways yanti pegawai minimarket hafal ritme gates of olympus karyawan muda raup 20 juta dari black scatter rahasia tips trik