Description of Course
The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”
Entry Requirements
N/A
Course Content
- Lecture1.1
- Introduction to Ethical Hacking
- Lecture1.2
- Footprinting and Reconnaissance
- Lecture1.3
- Scanning Networks
- Lecture1.4
- Enumeration
- Lecture1.5
- System Hacking
- Lecture1.6
- Malware Threats
- Lecture1.7
- Sniffing
- Lecture1.8
- Social Engineering
- Lecture1.9
- Denial of Service
- Lecture1.10
- Session Hijacking
- Lecture1.11
- Hacking Web Applications
- Lecture1.12
- SQL Injection
- Lecture1.13
- Hacking Wireless Networks
- Lecture1.14
- Hacking Web servers
- Lecture1.15
- Hacking Mobile Platforms
- Lecture1.16
- Evading IDS, Firewalls and Honeypots
- Lecture1.17
- Cloud Computing
- Lecture1.18
- Cryptography