loading......

coming soon

Coming Soon

We are in process of building the inventory of good professionals in this category

Got it!

Where do you need ?

location

Please select a Location.

Enquire

Submit your enquiry for Ethical Hacking Online Training

Please enter valid question or comment

Please enter your name.

Please enter valid email

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Gunwant

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

Ethical Hacking Online Training

Ethical Hacking Online Training

Online Instructor led Course

Platform: Skype, Google Hangout

17,000

No Reviews Yet
0 Interested

About the Course


Ethical Hacking Training provides a comprehensive and practical-oriented skills and expertise to meet the standards of highly skilled Ethical hackers or Penetration testers. Several subject matter experts and authors have contributed to the state-of-the-art content and training material presented in this Ethical Hacking Training course. This training program focuses on the latest hacking attacks targeted to web and mobile platforms and covers countermeasures to secure IT network and infrastructure. It has simplified advanced technical content with an emphasis on vulnerability assessment, risk assessment, penetration testing, and system protection.

Topics Covered

1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffing
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Hacking Mobile Platforms
17. Evading IDS, Firewalls & Honeypots
18. Buffer Overflows
19. Cryptography
20. Penetration Testing

Who should attend

- Students with interest in Information Security
- IT professionals
- Security Analysts
- Security Testers
- Security Enthusiasts

Pre-requisites

- Basic understanding of computing
- Know-how of TCP/IP
- Networking Know-how

What you need to bring

PC/Laptop with a high-speed Internet Connection.

Key Takeaways

- Course Materials (soft copies)
- Videos/Lectures/PDFs
- Security Tools
- Practice Questions/material
Reviews
There are no Reviews yet. Be the First to Review
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask


There are no Reviews yet. Be the First to Review

Date and Time

Not decided yet.

About the Trainer

Gunwant Singh picture

Gunwant Singh

Msc. in Network Security, CISSP, GXPN


I am a Senior Security Analyst with over 13 years of industrial experience in Information Security. I have tested and secured a number of government applications and software used by several Fortune 500 companies of the world.

I am currently holding CISSP & GXPN certifications and work mostly in Penetration Testing and hardening of web servers. I have experience in teaching corporate and individual staff for about 5-7 years.

I host a blog for students and currently write articles and whitepapers for several companies. I have been involved in hosting training on Application Security and I was invited for a couple of sessions for OWASP Delhi and Houston (USA) chapters.
Seats Left-

Students Interested 0

Course Id: 28548