Price:
$3,450.00
Days:
1
Virtual
– • Cover the fundamentals of key issues in the information security world, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
– • Learn how to use the latest techniques and tools to perform foot printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.
– • Learn various enumeration techniques, such as Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits, plus associated countermeasures.
– • Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems.
– • Learn about the various system hacking methodologies—including steganography, steganalysis attacks, and covering tracks—used to discover system and network vulnerabilities.
– • Get an introduction to the different types of malware, such as Trojans, viruses, and worms, as well as system auditing for malware attacks, malware analysis, and countermeasures.
– • Learn about packet-sniffing techniques and how to use them to discover network vulnerabilities, as well as countermeasures to defend against sniffing attacks.
– • Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
– • Learn about different Denial-of-Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
– • Understand the various session hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
– • Get introduced to firewall, intrusion detection system, and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
– • Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
– • Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.
– • Learn about SQL injection attack techniques, injection detection tools, and countermeasures to detect and defend against SQL injection attempts.
– • Learn about wireless encryption, wireless hacking methodologies and tools, and Wi-Fi security tools.
– • Learn about mobile platform attack vectors, Android vulnerability exploits, and mobile security guidelines and tools.
– • Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud-based threats and attacks, and cloud security techniques and tools.
– • Learn about cryptography and ciphers, public-key infrastructure, cryptography attacks, and cryptanalysis tools.
• Good knowledge and understanding of OS, TCP/IP, and Network
• Basic understanding of network essentials and core concepts, including server and network components
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Cryptography
• Cryptography
• Cryptography
• Cryptography
• Cryptography
• Cryptography
• Cryptography
• IoT and OT Hacking
• IoT and OT Hacking
• IoT and OT Hacking
• IoT and OT Hacking
• IoT and OT Hacking
• IoT and OT Hacking
• IoT and OT Hacking
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.