Introduction to Ethical Hacking

About This Course

This traning introduces students to the basics of Ethical Hacking

This course will provide the learners an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each learner in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Pre Requisites

  • Working knowledge of TCP/IP

Who Should Attend

  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • Individuals concerned about the integrity of the network infrastructure