Overview
This course provides students the knowledge and skill to scan, test, hack, and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks. The Certified Ethical Hacker program is a trusted and respected ethical hacking training Program. This course is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks.
Course Objectives
Upon completion of this course, you will accomplish the following:-
- Various types of footprinting, footprinting tools, and countermeasures.
- Network scanning techniques and scanning countermeasures.
- System hacking methodology, steganography, and covering tracks.
- Different types of Trojans, Trojan analysis, and Trojan countermeasures.
- Working with viruses, virus analysis, computer worms, malware analysis procedures, and countermeasures.
- Packet sniffing techniques and how to defend against sniffing.
- Social Engineering techniques, identify theft, and social engineering countermeasures.
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
- Different types of webserver & web application attacks.
- SQL injection attacks & Wireless Encryption.
- Mobile platform attack vector & android vulnerabilities.
Certified Ethical Hacker
Course Objectives
Course Provider: Person