* All fees are exclusive of vat ** PREMIUM - Customize your learning experience
Our most popular information security and hacking training goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You leave with the ability to quantitatively assess and measure threats to information assets, and discover where your organization is most vulnerable to hacking in this network security training course.
What Do Participants Learn?
Key issues plaguing the information security world, incident management process, and penetration testing.
Various types of footprinting, footprinting tools, and countermeasures
Network scanning techniques and scanning countermeasures
Enumeration techniques and enumeration countermeasures.
System hacking methodology, steganography, steganalysis attacks, and covering tracks
Different types of Trojans, Trojan analysis, and Trojan countermeasures
Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
Packet sniffing techniques and how to defend against sniffing.
Social Engineering techniques, identify theft, and social engineering countermeasures
DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
Session hijacking techniques and countermeasures.
Different types of webserver attacks, attack methodology, and countermeasures
Different types of web application attacks, web application hacking methodology, and countermeasures
SQL injection attacks and injection detection tools.