This course is designed to help you master an ethical hacking methodology that can be used in penetration testing to systematically and lawfully assess the security of a system.
This course is designed to help you master an ethical hacking methodology that can be used in penetration testing to systematically and lawfully assess the security of a system.
Current and prospective information security professionals will be trained to find, with the network owner's consent, potentially exploitable security vulnerabilities.
This course delivers in-demand ethical hacking skills, tools, and techniques while preparing you for the internationally-recognized Certified Ethical Hacker certification exam (312-50) from EC-Council.
This course will help get you into a “Hacker's Mindset” in order to best prepare you to think like a hacker and better defend against possible attacks.
EC-Council security experts have designed a variety of labs, which mimic real-time scenarios to help you “live” through attacks as if they were real. You’ll also be given access to over 2,200 commonly used hacking tools to immerse you into the hacker world. More than 40 percent of class time is dedicated to hands-on, practical learning skills.
At TBC, your labs will be complimented by simulations and mock "attack and defend" scenarios (red and blue: experiencing both sides will allow participants to better grasp the wholistic, purple, process required for effectively understanding ).
Who this course is intended for:
Security officers
Ethical Hackers
Auditors
Web managers
Security professionals
Site administrators
Penetration testers
Individuals concerned about the integrity of network infrastructure
Course Outline
Module 01:Introduction to Ethical Hacking
Module 02:Footprinting and Reconnaissance
Module 03:Scanning Networks
Module 04:Enumeration
Module 05:Vulnerability Analysis
Module 06:System Hacking
Module 07:Malware Threats
Module 08:Sniffing
Module 09:Social Engineering
Module 10:Denial-of-Service
Module 11:Session Hijacking
Module 12:Evading IDS, Firewalls & Honeypots
Module 13:Hacking Web Servers
Module 14:Hacking Web Applications
Module 15:SQL Injection
Module 16:Hacking Wireless Networks
Module 17:Hacking Mobile Platforms
Module 18:IoT Hacking
Module 19:Cloud Computing
Module 20:Cryptography
Toronto Business College is a Private Career College registered under the Private Career Colleges Act, 2005.
Toronto Business College offers specialized programs and services which fit the needs of individuals and employers so that they are able to succeed in today’s job market.
Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber attacks and about the tools and penetration testing methodologies used by ethical hackers.
Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber attacks and about the tools and penetration testing methodologies used by ethical hackers.
Infoventure Technologies offers job-oriented IT courses. Having successfully completed an IT course and a certificate will be advantageous to you when you apply for a job. If you are new to IT, you can join one of the general IT courses.
In this CEH training course, you are provided with the foundational knowledge needed to pass the EC-Council Certified Ethical Hacker (CEH v11) exam. You will learn how to deploy tools and techniques to protect your network through hands-on labs that mimic real-life scenarios.
This highly hands-on course gives participants experience in network and system penetration testing. It covers all of the exam objectives for the ECC 312-50 version 12 exam while taking the learner step-by-step through hacking and exploiting each network and system type.
© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy