Our most popular information security and hacking training goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets, and discover where your organization is most vulnerable to hacking in this network security training course.
• understanding how perimeter defenses work and then be lead into scanning and attacking their own networks • learn how Intruders escalate privileges and what steps can be taken to secure a system • understanding and experience in Ethical Hacking • Learning about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
Who Should Attend?
• IT Security • IT Security Auditing • Technical IT Management • Those with the involvement of systems integration and corporate IT development. Financial controllers with a technical interest may also benefit from the training course.
• Penetration testing methodologies • Stealthy network recon • Passive traffic identification • Remote root vulnerability exploitation • Privilege escalation hacking • IPv6 Vulnerabilities • Remote access trojan hacking • Running shellcode in RAM vs. on disk • Wireless insecurity • Breaking IP-based ACLs via spoofing • Abusing Windows Named Pipes for Domain Impersonation • Evidence removal and anti-forensics • Attacking network infrastructure devices • Hacking by brute forcing remotely • Hiding exploit payloads in jpeg and gif image files • Hacking Web Applications • Breaking into databases with SQL Injection • Cross Site Scripting hacking • Hacking into Cisco routers • Justifying a penetration test to management & customers • CEH review • Defensive techniques
NOT INTERESTED IN THIS COURSE?
We always want to improve the quality of our courses. Please select any reasons why you feel this course is inadequate (check all that apply).