About the Course
To beat a hacker, you need to think like one!
Ethical Hacking is often referred to as the process of penetrating one’s own computer/s or computers to which one has official permission to do so as to determine if vulnerabilities exist and to undertake preventive, corrective, and protective countermeasures before an actual compromise to the system takes place.
Topics Covered1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
5. System Hacking
6. Trojan and Backdoors
7. Viruses and Worms
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks with Tools
16. Evading IDS, Firewalls, and Honeypots
17. Buffer Overflow
Who should attendThe Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Pre-requisitesBasic OS & Networking knowledge.
What you need to bringNA
Key TakeawaysKnowledge & Certification