Certified Ethical Hacker


Introduction

This 5-day Certified Ethical Hacker program is the most desired cyber/information security training program aimed at information security professionals. To master hacking technologies, you will need to become one…but an ethical one! This EC Council accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

This course will immerse you into the ‘Hacker Mindset’ in order for you to defend against attacks. The security mindset in any organization must not be limited to the silos of a vendor, technology or piece of equipment.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving an optimal information security posture in any organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks.

Audience Profile

The EC Council Certified Ethical Hacker training course will significantly benefit IT and IS security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

Outcomes

After completing this course, attendees will:

  • Understand key issues plaguing the information security world, incident management process, and penetration testing.
  • Learn about various types of footprinting, footprinting tools and countermeasures.
  • Learn network scanning techniques and scanning countermeasures.
  • Understand enumeration techniques and enumeration countermeasures.
  • Learn about system hacking methodologies, steganography, steganalysis attacks, and covering tracks.
  • Learn about different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Understand the working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Learn and practice packet sniffing techniques and how to defend against sniffing.
  • Understand Social Engineering techniques, identify theft, and social engineering countermeasures.
  • Learn about DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Understand session hijacking techniques and countermeasures.
  • Understand different types of webserver attacks, attack methodologies, and countermeasures.
  • Learn about different types of web application attacks, web application hacking methodologies and countermeasures.
  • Learn about SQL injection attacks and injection detection tools.
  • Learn about Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Understand mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  • Understand firewalls, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  • Learn about various cloud computing concepts, threats, attacks, and security techniques and tools.
  • Understand different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Analyse various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • Understand different threats to IoT platforms and learn how to defend IoT devices securely

Onsite training?

If you need training for three or more people, ask us about training at your site. You can enjoy the convenience of reduced travel cost and time, as well as a familiar environment for your staff. Additionally, we can customise the course for your business needs.

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.



User Reviews

Not yet rated. You will need to follow this course before you can write a review.

Course Info


Schedule

  • Melbourne
  • 7/10/2019 - 11/10/2019

Next Step

Book Course Now
Enquire Now
Tell a Friend
Email Course Outline