• Classroom
  • Online, Instructor-Led
  • Online, Self-Paced
Course Description

If you're concerned about the integrity of your network's infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network's defenses. You'll begin by learning how perimeter defenses work. By scanning and attacking your own network (no real networks will be harmed), you'll also learn how intruders operate and the steps to secure a system. In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

Learning Objectives

 

  • Footprinting
  • Network scanning
  • Enumeration
  • Packet sniffing
  • Social engineering
  • DoS/DDoS
  • Session hijacking
  • Webserver and web application attacks and countermeasures
  • SQL injection attacks
  • Wireless encryption
  • Cloud computing threats
  • Cryptography ciphers
  • Penetration testing

 

Framework Connections