Hands on Security Training Courses

Hands on Security Training

Hands on Security courses

Hands on Security Course Outlines

Code Name Duration Overview
ccsk CCSK - Certificate of Cloud Security Knowledge - Plus 14 hours Description: This 2-day CCSK Plus course includes all content from the CCSK Foundation course, and expands on it with extensive hands-on labs in a second day of training. Students will learn to apply their knowledge by performing a series of exercises involving a scenario that brings a fictional organization securely into the cloud. After completing this training, students will be well prepared for the CCSK certification exam, sponsored by Cloud Security Alliance. This second day of training includes additional lecture, although students will spend most of their time assessing, building, and securing a cloud infrastructure during the exercises. Objectives: This is a two day class that begins with the CCSK- Basic training, followed by a second day of additional content and hands-on activities Target Audience: This class is geared towards security professionals, but is also useful for anyone looking to expand their knowledge of cloud security. DAY 1 Introduction and Cloud Architecture Define cloud computing Cloud computing stack components Cloud reference model and security Infrastructure Security for Cloud Computing Understand the components of cloud infrastructure Assess security implications of deployment models Advantages and disadvantages of virtual Cloud management plane Different service models security basics Managing cloud computing security and risk Risk and governance Legal and compliance Audit Portability and interoperability Incident response Data security for cloud Different cloud storage models Security issues for data in cloud Address cloud security and governance Apply lifecycle to use cases Discuss data encryption Securing applications and users Application architecture design and operations lifecycle Discuss impact on SDLC Examine application security tools Discuss role of compliance in Cloud Cloud Risk assessment Adopt cloud computing Migrate existing apps and systems Create and secure a public cloud Understand public IaaS architectures Review EC2 components Launch and connect to your first instance Learn how to secure your instance DAY 2 Encrypting an EBS volume Why encrypt Select a method Create and attach Amazon EBS Encrypt and format Understand key management options Understand effects of rebooting Attach encrypted volume to another instance Identity and access management Learn how to secure your EC2 with AWS IAM Understand federated identity architectures Implement federated identity for application using OpenID How to apply same principles in an enterprise production environment Deploy and secure a Private Cloud Understand private cloud architecture Review OpenStack components Create and connect a compute node Manage OpenStack tenants and IAM Secure OpenStack management plane Investigate hypervisor security Understand security automation Selecting Cloud services Enabling security strategy Selecting a cloud provider Security as a service Summary and review
secitp Security for IT Practitioners 35 hours Description: A 5-day course that will take anyone in a current IT job role into the world of Information Security. This is a fantastic start point for those wanting to go into the major growth area of IT which is Security. Many practical labs are used throughout the course to improve student understanding of theoretical concepts and give them experience of real-world products. This course is aimed at individuals who want to move into the Information Security arena or simply want to gain a broader working knowledge of the topic. Objectives: To give students of all levels a good appreciation of security issues when dealing with computers and networks. Audience: People who work in IT 1 Introduction to security a) What is security b) White hats v black hats c) Threats to resources d) A simple security model e) Industry security standards f) Security policies g) Authentication h) Encryption i) Access control j) Audit and administer 2 TCP/IP for Security a) TCP/IP Architecture b) LANs and WANs c) IP and ICMP services d) ARP and routing e) Transport services 3 Applied Cryptography a) Encryption and trust relationships b) Symmetric encryption c) Asymmetric encryption d) Message digests e) Digital certificates f) Certificate authorities g) IPSec and VPNs 4 Virtual Private Networks a) VPN Benefits b) PPP with PAP and CHAP c) Tunnelling Protocols d) Virtual Private Dialup Networks e) IPSec a) Internet Key Exchange (IKE) 5 Types of Attack a) Spoofing b) Man-in-the-middle c) Denial of service d) Insider attacks e) Bug-based attacks f) Key logging g) Brute force attacks h) Trojans, viruses and worms i) Root kits 6 Firewall Roles and Types a) Packet filters b) Stateful inspection c) Circuit level gateways d) Application proxies e) Demilitarised zones f) Network address translation 7 Firewall Design Topology and Management a) Design principles b) Common topologies c) ICMP and firewalls d) Firewall management 8 World Wide Web Security a) Web technologies b) Browser privacy c) Cookies d) Mobile code threats e) Web server security f) Web traffic security 9 Intrusion Detection Systems a) IDS methodologies b) IDS concerns 10 Operating System Security a) Key OS vulnerabilities b) Windows security components c) Linux security components 11 The Auditing Process a) Introduction b) Risk analysis c) Ethical hacking d) Auditing and log analysis e) Windows & Linux logging f) Making recommendations and producing reports 12 Wireless Networking a) Protocols and security standards
iast Interactive Application Security Testing (IAST) 14 hours Interactive Application Security Testing (IAST) is a form of application security testing that combines Static Application Security Testing (SAST) and Dynamic Application Security Testing (DAST) or Runtime Application Self-protection (RASP) techniques. IAST is able to report the specific lines of code responsible for a security exploit and replay the behaviors leading to and following such an exploit. In this instructor-led, live training, participants will learn how to secure an application by instrumenting runtime agents and attack inducers to simulate application behavior during an attack.   By the end of this training, participants will be able to: Simulate attacks against applications and validate their detection and protection capabilities Use RASP and DAST to gain code-level visibility into the data path taken by an application under different runtime scenarios Quickly and accurately fix the application code responsible for detected vulnerabilities Prioritize the vulnerability findings from dynamic scans Use RASP real-time alerts to protect applications in production against attacks. Reduce application vulnerability risks while maintaining production schedule targets Devise an integrated strategy for overall vulnerability detection and protection Audience DevOps engineers Security engineers Developers Format of the course Part lecture, part discussion, exercises and heavy hands-on practice To request a customized course outline for this training, please contact us.
webap WEBAP - Web Application Security 28 hours Description: This course will give the participants thorough understanding about security concepts, web application concepts and frameworks used by developers in order to be able to exploit and protect targeted application. In today’s world, that is changing rapidly and thus all the technologies used are also changed at a fast pace, web applications are exposed to hackers attacks 24/7. In order to protect the applications from external attackers one has to know all the bits and pieces that makes the web application, like frameworks, languages and technologies used in web application development, and much more than that. The problem is that attacker has to know only one way to break into the application and developer (or systems administrator) has to know all of the possible exploits in order to prevent this from happening. Because of that it is really difficult to have a bullet proof secured web application, and in most of the cases web application is vulnerable to something. This is regularly exploited by cyber criminals and casual hackers, and it can be minimized by correct planning, development, web application testing and configuration. Objectives: To give you the skill and knowledge needed to understand and identify possible exploits in live web applications, and to exploit identified vulnerabilities. Because of the knowledge gained through the identification and exploitation phase, you should be able to protect the web application against similar attacks. After this course the participant will be able to understand and identify OWASP top 10 vulnerabilities and to incorporate that knowledge in web application protection scheme. Audience: Developers, Police and other law enforcement personnel, Defense and Military personnel, e-Business Security professionals, Systems administrators, Banking, Insurance and other professionals, Government agencies, IT managers, CISO’s, CTO’s. Module 1: Security concepts Module 2: Risk management Module 3: Hackers attack phases Module 4: Penetration testing Module 5: Networking MitM attacks Module 6: Overview of web technologies and frameworks Module 7: Tools of the trade Module 8: Bypassing client side controls Module 9: Authentication attacks Module 10: Design/implementation flaws Module 11: Web application attacks: Injection (A1) Module 12: Web application attacks: XSS/CSRF (A3/A8) Module 13: Web application attacks: Broken authentication and session management (A2) Module 14: Web application attacks: Insecure direct object references/Missing function level access control (A4/A7) Module 15: Web application attacks: Security mis-configuration/Sensitive data exposure (A5/A6) Module 16: Web application attacks: Unvalidated redirect and forwards (A10) Module 17: Logical flaws
chfi CHFI - Certified Digital Forensics Examiner 35 hours The Certified Digital Forensics Examiner vendor neutral certification is designed to train Cyber Crime and Fraud Investigators whereby students are taught electronic discovery and advanced investigation techniques. This course is essential to anyone encountering digital evidence while conducting an investigation. The Certified Digital Forensics Examiner training teaches the methodology for conducting a computer forensic examination.  Students will learn to use forensically sound investigative techniques in order to evaluate the scene, collect and document all relevant information, interview appropriate personnel, maintain chain-of-custody, and write a findings report. The Certified Digital Forensics Examiner course will benefit organizations, individuals, government offices, and law enforcement agencies interested in pursuing litigation, proof of guilt, or corrective action based on digital evidence. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. Module 1:                  Introduction Module 2:                  Computer Forensic Incidents Module 3:                  Investigation Process Module 4:                  Disk Storage Concepts Module 5:                  Digital Acquisition & Analysis Module 6:                  Forensic Examination Protocols Module 7:                  Digital Evidence Protocols Module 8:                  CFI Theory Module 9:                  Digital Evidence Presentation Module 10:                Computer Forensic Laboratory Protocols Module 11:                Computer Forensic Processing Techniques Module 12:                Digital Forensics Reporting Module 13:                Specialized Artifact Recovery Module 14:                e-Discovery and ESI Module 15:                Mobile Device Forensics Module 16:                USB Forensics Module 17:                Incident Handling Mile2 - Lab 1:  Preparing Forensic Workstation AccessData FTK Imager Installation Autopsy Installation National Software Reference Library (NSRL) for autopsy 7z Installation Install Registry Viewer Install Password Recovery Tool Kit (PRTK – 5.21) Lab 2:  Chain of Custody Chain of Custody Search and Seizure Chain of Custody Forensic Imaging Lab 3:  Imaging Case Evidence / FTK Imager Lab 4:  Create a new case for Autopsy Creating a Case in Autopsy Lab 5:  Reviewing Evidence / Autopsy (Case #1) User MTBG attempting to hack his/her previous employer Reviewing Evidence in Autopsy Case Study scenario: The evidence you are required to discover (Challenge) Final Report for MTBG case           Lab 6:  Reviewing Evidence / Autopsy (Case #2) Greg Schardt case Case Study Scenario: The evidence you are required to discover (Challenge)
eccnetsecadm EC-Council - Network Security Administrator 35 hours Description: The EC-Council's NSA certification looks at network security from a defensive view. The NSA program is designed to provide fundamental skills needed to analyse the internal and external security threats against your network, and to help you develop the correct security posture that will protect your organisation. Students will learn how to evaluate network and Internet security issues. They will design and implement successful security policies relevant to you. In addition, they will learn how to expose systems and network vulnerabilities and defend against them. Why should you attend this course before Certified Ethical Hacker (C|EH)? Although attending this course and passing the exam is not a prerequisite of C|EH training or subsequently taking the C|EH exam, it is highly recommended. The C|EH program looks at security in offensive mode, while the NSA program looks at network security in defensive mode, therefore they compliment each other and help build a complete picture of today's Information Security landscape. Audience: System Administrators and Network Administrators as well as anyone who is interested in defensive network security technologies. Please note: Due to the required depth and breadth of knowledge needed to pass this ECNSA exam QA has taken the step of scheduling the exam separately to the course. This has been done in order to allow for a period of further self study to fully prepare for the exam. Delegates will sit the ECNSA exam at 10.30 am on the Friday two weeks after the course is concluded. Delegates will be required to book on to the ECNSAEX. The exam duration is maxiumum four hours. During this two week period delegates will be provided with further structured self study materials and will be assisted in their study via two scheduled Webinar sessions hosted by your delivering instructor. Full details of the self study resources and the Webinar sessions will be provided to the delegates during the course. Module 1: Introduction to Network Security Network topology; Network Types and the OSI Model Module 2: Network Protocols Network Protocols: SLIP; PPP; ARP; RARP; IGMP; ICMP; SNMP, HTTP IP: Attacks and Countermeasures TCP, UDP: Attacks and Countermeasures FTP, TFTP, TELNET, SMTP: Vulnerabilities Module 3: Security Policy What is Security Policy? What Defines a good security policy Security Policy Structure Developing and Implementing security policies Requirements of Effective Security Policy Module 4: Physical Security Physical Security Threats Locks and Keys TEMPEST Fire Safety: Fire Suppression, Gaseous Emission Systems Laptop Security: Physical Security Countermeasures Biometric Devices PC Security: Boot Access Module 5: Network Attacks Current Statistics Defining Terms: Threats, Attack and Exploit Classification of Hackers and Attacks Spoofing; Spamming; Eaves Dropping; Phishing; War Dialing; Password Cracking Web Page Defacement; SQL Injection; Wire Tapping; Buffer Overflow War Driving; War Chalking; War Flying Denial of Service (DOS) Attacks and Distributed DOS Module 6: Intrusion Detection System Characteristics of IDS Host based IDS Vs Network based IDS IDS Detection Methods; Types of Signatures Intrusion Prevention System IDS Vs IPS IPS Tool Module 7: Firewalls Handling threats and security tasks Protection against hacking Centralization and Documentation Multi-layer firewall protection Packet filtering and Stateful Packet Filtering Multi firewall DMZ Specialty firewalls and Reverse firewalls Module8: Packet Filtering and Proxy Servers Network Address Translation Application layer gateway and Proxying Virtual Private Network and the Authentication process Module 9: Bastion Host and Honeypots Bastion Host Honeypots and Honeynet Module 10: Hardening Routers Internet work Operating Systems (IOS) Troubleshooting a router Hardening a Router Components of router security Router security: testing tools Module 11: Hardening Operating Systems Security Windows Security Objects And Permissions NTFS File System Permissions Active Directory Kerberos Authentication And Security IP Security Linux Module 12: Patch Management Red Hat Up2date Patch Management Utility Installation Steps Microsoft Patch Management Process and Windows Update Services Patch Management Tools: Qchain Patch Management Tool: Microsoft Baseline Security Analyzer Other Patch Management Tools Module 13: Application Security Securing Web Applications IPSec And SSL Security Writing Secure Code; Best Practices Remote Administration Security Module 14: Web Security Network Devices and Design Altering the Network Addresses Client Authorization and Secure Client Transmissions Portable Applications Malicious Code Detection Browser Security Settings Common Gateway Interface (CGI) Web Application Input Data Validation and Buffer Overflows Module 15: E-Mail Security Components Of An Email E-mail protocols E-Mail Security Risks How to defend against E-Mail security risks Module 16: Encryption Firewalls Implementing Encryption Maintaining confidentiality Digital certificates Public and Private Keys (including PGP) Choosing the size of keys Analyzing popular encryption schemes including IPSEC Module 17: Virtual Private Networks VPN Tunneling Protocols PPTP and L2TP VPN Security Module 18: WLAN Wireless Network Types Antenna WLAN Standards BlueTooth And Ultra Wideband WEP Description Tool (Air Snort and WEPCrack) WLAN Security;WPA; TKIP; WTLS EAP Methods Advanced Encryption Standards (AES); DES; RSA Encryption RADIUS; Multifactor Authentication Mobile Security Through Certificates Certificate Management Through PKI Module 19: Creating Fault Tolerance Network Security: Fault Tolerance Why Create Fault Tolerance Planning For Fault Tolerance Reasons For System Failure Preventive Measures Module 20: Incident Response What Is an Incident Step by Step Procedure Managing Incidents What Is an Incident Response Six Step Approach for Incident Handling (PICERF Methodology) Incident Response Team Module 21: Disaster Recovery and Planning What is a Disaster Recovery Disaster Recovery Planning Business Continuity Planning Process Disaster Prevention Module 22: Network Vulnerability Assessment Vulnerability Assessment Goals of vulnerability assessment Network vulnerability Assessment methodology: Selecting vulnerability assessment tools
devopssecurity DevOps Security: Creating a DevOps security strategy 7 hours DevOps is a software development approach that aligns application development with IT operations. Some of the tools that have emerged to support DevOps include: automation tools, containerization and orchestration platforms. Security has not kept up with these developments. In this course, participants will learn how to formulate the proper security strategy to face the DevOps security challenge. Audience     Devops engineers     Security engineers Format of the course     Part lecture, part discussion, some hands-on practice Introduction     How DevOps creates more security risk for organizations         The price of agility, speed and de-centralized control Inadequacies of traditional security tools     Security policies     Firewall rules     Lack of APIs for integration     Lack of visualization tools Implementing a DevOps-ready security program Aligning security with business goals Removing the security bottleneck Implementing detailed visibility Standardizing security configurations Adding sensors into the application     Interactive Application Security Testing     Runtime Application Self-Protection Providing security data to DevOps tools through RESTful APIs On-demand scaling, micro-perimeterization of security controls Per-resource granular security policies Automating attacks against pre-production code Continually testing the production environment Protecting web applications from an Agile/DevOps perspective Securing containers and clouds Embracing next generation automated security tools The future of DevOps and its strategic role in security Closing remarks
embeddedsecurity Embedded systems security 21 hours This training introduces the system architectures, operating systems, networking, storage, and cryptographic issues that should be considered when designing secure embedded systems. By the end of this course, participants will have a solid understanding of security principles, concerns, and technologies. More importantly, participants will be equipped with the techniques needed for developing safe and secure embedded software. Audience     Embedded systems professionals     Security professionals Format of the course     Part lecture, part discussion, hands-on practice Introduction     Security vs embedded systems security Characteristics of embedded application security     Embedded network transactions     Automotive security     Android devices     Next-generation software-defined radio Critical aspects of an embedded system     Microkernel vs monolith     Independent security levels     Core security requirements     Access control     I/O virtualization Performing threat modeling and assessment       Attackers and assets     Attack surface     Attack trees     Establishsing a security policy Developing secure embedded software     Secure coding principles     Secure program design     Minimal Implementation     Component architecture     Least privilege     Secure development process     Independent expert validation     Model-driven design     Code review and static analysis     Security testing     Peer code reviews Understanding and implementing cryptography     Cryptographic modes     Cryptographic hashes     Cryptographic certifications     Managing keys     Block ciphers     Message Authentication Codes     Random Number Generation Data protection     Data-in-motion protocols     Securing data in motion     Data-at-rest protocols     Securing data at rest Mitigating attacks     Common software attacks     Preventing side-channel attacks Retrofitting security in existing projects     Securing bootloaders and firmware updates Closing remarks
pkiimpman PKI: Implement and Manage 21 hours Overview This Public Key Infrastructure – Implement and Manage course helps any individual to gain knowledge in managing robust PKI and having better understanding of topics surrounding public key infrastructure. Moreover, the PKI course is a preparation for the increasingly critical component – which ensures confidentiality, integrity, and authentication in an enterprise. Our PKI course provides the knowledge and skills necessary to select, design and deploy PKI, to secure existing and future applications within your organization. It also gives a deeper look into the foundations of cryptography and the working principles of the algorithms being used. Throughout the whole course, participants will gain in-depth knowledge on the following topics: Legal aspects of a PKI Elements of a PKI PKI management Trust in a digital world Digital signature implementation Trust models After completing the PKI course, each individual will be able to successfully design, setup, deploy, and manage a public key infrastructure (PKI). This is a 3-day course is considered essential for anyone who needs to understand Public Key Infrastructure (PKI) and the issues surrounding its implementation. It covers the issues and technologies involved in PKI in-depth and gives hands-on practical experience of setting up and maintaining a variety of PKI solutions. Detailed knowledge of issues surrounding PKI helps to put recent attacks which have appeared in the news headlines into context and enable valid decisions to be made about their relevance to your organisation. Objectives To introduce the student to the theoretical aspects of the foundations and benefits of Public Key Infrastructure (PKI), including different types of encryption, digital signatures, digital certificates and Certificate Authorities. To give students hands on experience of implementing and using PKI solutions with a variety of applications. To give students an understanding of the concepts of evaluating and selecting PKI technologies Audience Anyone involved in Public Key Infrastructure | PKI decision-making, implementing and securing e-commerce and other Internet applications, including CIOs, Chief Security Officers, MIS Directors, Security Managers and Internal Auditors. Introduction to PKI Basic Security Concepts Public Key Infrastructure Defined Digital Certificates and Signatures Smart Cards PKI Standards Basic cryptography Uses of Cryptography History of Cryptography including early methods Symmetric and Asymmetric Encryption plus Algorithms Diffie-Hellman Key Generation Hashing for Integrity plus Algorithms Practical uses for encryption and associated issues Signed and Encrypted Email using S/MIME and PGP Secure connections to websites Digitally signing PDFs Encrypting files Encrypting hard drives Encrypting “containers” SSL, VPN and Wireless PKI and Cloud Computing Attacks on Encryption Certificate Authorities Public v Private CAs Regulations governing CAs CA Certificate Policies Types of Certificates Provided CA Hierarchies Certificate Authority Operations Certificate expiration Certificate revocation Certificate Revocation Lists (CRL) Online Certificate Status Protocol (OCSP) Key recovery Installing a CA and issuing certificates Certificate Templates Summary Top 5 Deployment Issues Top 10 Risks Advanced PKI Topics and Futures Summary of Public Key Infrastructure
eccsecana EC-Council Security Analyst 35 hours Description: The EC–Council Security Analyst (ECSA) programme is a comprehensive, standards-based, methodology intensive training program which teaches information security professionals to conduct real life penetration tests by utilizing EC-Council’s published penetration testing methodology. The ECSA Programme is a 5-day complete hands-on training programme. This Penetration Testing training course uses real-time scenarios to train students in penetration testing methodologies. EC-Council’s Certified Security Analyst (ECSA) course will help you master a documented penetration testing methodology that is repeatable and that can be used in a penetration testing engagement, globally ECSA Lab Environment: The ECSA course is a fully hands-on program. The exercises cover real world scenario. By practicing the skills that are provided to you in the ECSA class, we are able to bring candidates up to speed with the latest threats that organizations may be vulnerable to. This can be achieved with the EC-Council iLabs cyber range. It allows students to dynamically access a host of Virtual Machines preconfigured with vulnerabilities, exploits, tools, and scripts from anywhere with an internet connection. With iLabs, lab exercises can be accessed 24x7 allowing the student to practice skills in a safe, fully functional network anytime it’s convenient. Target Audience: Network server administrators, firewall administrators, information security analysts, system administrators, and risk assessment professionals all benefit from the ECSA programme Core modules: 1. Need for Security Analysis 2. TCP IP Packet Analysis 3. Penetration Testing Methodologies 4. Customers and legal Agreements 5. Rules of Engagement 6. Penetration Testing Planning and Scheduling 7. Pre- Penetration Testing Steps 8. Information gathering 9. Vulnerability Analysis 10. External penetration Testing 11. Internal Network Pen Testing 12. Firewall Penetration Testing 13. IDS Penetration Testing 14. Password Cracking Penetration Testing 15. Social Engineering Penetration testing 16. Web Application Penetration Testing 17. SQL Penetration Testing 18. Penetration Testing Reports and Post Testing Actions Self Study Modules: 1. Router and Switches Penetration Testing 2. Wireless Network Penetration Testing 3. Denial-of-Service Penetration Testing 4. Stolen Laptop, PDAs and Cell Phones Penetration Testing 5. Source Code Penetration Testing 6. Physical Security Penetration Testing 7. Surveillance Camera Penetration Testing 8. Database Penetration Testing 9. VoIP Penetration Testing 10. VPN Penetration Testing 11. Cloud Penetration Testing 12. Virtual Machine Penetration Testing 13. War Dialling 14. Virus and Trojan Detection 15. Log Management Penetration Testing 16. File Integrity Checking 17. Mobile Devices Penetration Testing 18. Telecommunication and Broadband Communication Penetration Testing 19. Email Security Penetration Testing 20. Security Patches Penetration Testing 21. Data Leakage Penetration Testing 22. SAP Penetration Testing 23. Standards and Compliance 24. Information System Security Principles 25. Information System Incident and Response 26. Information System Auditing and Certification
eccehcm EC-Council – Ethical Hacking and Countermeasures 35 hours Description: This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how Intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50. Objectives: To prepare the student for the Ethical Hacking and Countermeasures examination. On passing this examination you will be awarded the Certified Ethical Hacker certification awarded by the EC-Council (The International Council of Electronic Commerce Consultants). Target Audience: This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Overview: The Ethical Hacking and Countermeasures curriculum consists of instructor-led training and self-study. The Instructor will provide the details of self-study modules to the students at the beginning of the class. Module 1: Introduction to Ethical Hacking Module 2: Footprinting and Reconnaissance Module 3: Scanning Networks Module 4: Enumeration Module 5: System Hacking Module 6: Trojans and Backdoors Module 7: Viruses and Worms Module 8: Sniffers Module 9: Social Engineering Module 10: Denial of Service Module 11: Session Hijacking Module 12: Hacking Webservers Module 13: Hacking Web applications Module 14: SQL Injection Module 15: Hacking Wireless Networks Module 16: Hacking Mobile Platforms Module 17: Evading IDS, Firewalls and Honeypots Module 18: Buffer Overflow Module 19: Cryptography Module 20: Penetration Testing

Other regions

Weekend Hands on Security courses, Evening Hands on Security training, Hands on Security boot camp, Hands on Security instructor-led , Hands on Security on-site,Weekend Hands on Security training, Hands on Security one on one training , Hands on Security trainer , Hands on Security coaching, Hands on Security instructor, Hands on Security classes, Hands on Security private courses, Evening Hands on Security courses

Course Discounts Newsletter

We respect the privacy of your email address. We will not pass on or sell your address to others.
You can always change your preferences or unsubscribe completely.

Some of our clients