Ethical Hacking Specialization (5 Days)

by Tertiary Courses Malaysia Claim Listing

Dive into the world of cybersecurity with our 5 days ethical hacking specialisation, a meticulously designed course to foster the next generation of ethical hackers. This program offers an immersive experience, ensuring that participants acquire critical skills in identifying vulnerabilities, securi

RM5000

Contact the Institutes

Fill this form

Advertisement

Tertiary Courses Malaysia Logo

img Duration

5 Days

Course Details

Dive into the world of cybersecurity with our 5 days ethical hacking specialisation, a meticulously designed course to foster the next generation of ethical hackers. This program offers an immersive experience, ensuring that participants acquire critical skills in identifying vulnerabilities, securing networks, and defending against cyber threats. 

The curriculum is tailored to provide a comprehensive understanding of ethical hacking fundamentals, including the latest tools and techniques used in the industry. Whether you're a beginner or looking to upgrade your existing skills, this course is structured to cater to varying levels of expertise.

Throughout the duration of the course, learners will be engaged in practical, real-world scenarios, simulating the challenges faced by today’s cybersecurity professionals. Emphasis is placed on hands-on learning, with opportunities to apply theoretical knowledge to practical exercises. The course culminates with a project that allows participants to demonstrate their newfound skills in a controlled environment. 

Upon completion, graduates of the program will be equipped with the expertise needed to tackle contemporary cyber threats and will be prepared to take on roles as competent, ethical hackers in the rapidly evolving digital landscape.

Certificate

  • All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75 percent attendance.

Day 1 - Topic 1 Introduction to Ethical Hacking

  • Topic 1.1: Overview of Ethical Hacking Overview
  • Topic 1.2: Footprinting and Reconnaissance
  • Topic 1.3: Scanning Network
  • Topic 1.4: Enumeration

Day 2 - Topic 2 Vulnerability Analysis

  • Topic 2.1: Vulnerability Analysis
  • Topic 2.2: System Hacking
  • Topic 2.3: Malware Analysis
  • Topic 2.4: Sniffers
  • Topic 2.5: Scanning Network

Day 3 - Topic 3 Ethical Hacking Techniques

  • Topic 3.1: Social Engineering
  • Topic 3.2: Denial of Service
  • Topic 3.3: Session Hijacking
  • Topic 3.4: Evading IDS, Firewalls, and Honeypots 

Day 4 - Topic 4 Ethical Hacking on Network and IoT Devices

  • Topic 4.1  Hacking Web Servers and Web Applications
  • Topic 4.2: Wireless Networks
  • Topic 4.3 Mobile Devices and Platforms
  • Topic 4.4 Hacking IoT Devices

Day 5  - Topic 5  Ethical,  Penetration, Cryptography

  • Topic 5.1 Crytography 
  • Topic 5.2: Cloud Computing
  • Topic 5.3: Penetrating Testing

Prerequisite
The learner must meet the minimum requirement below :

  • Read, write, speak and understand English

Target Audience

  • NSF
  • Full Time Students
  • Data Analysts

Software Requirement

  • This course will use Google Colab for training. Please ensure you have a Google account.

Job Rules

  • NSF or Full Time Students
  • Data Analysts
  • Machine Learning Engineers and Developers
  • Kuala Lumpur Branch

    G-3A-02, Corporate Office Suite, KL Gateway, No 2, Jalan kerinchi, Gerbang kernichi Lestari, Kuala Lumpur
  • Teacher's Name
  • Muhammed
  • Teacher's Experience
  • Muhammed Siraj is an IT executive, lecturer, trainer, security expert, developer, hardware technician, and entrepreneur with over 15 years of experience in the IT profession. He is an experienced IT instructor who has delivered several lecturers in the area of Cybersecurity, Computer Forensics, and Fraud detection to the military, police, CID, Financial Institutions, among others. In addition to training, he provides consultancy services to Educational and Governmental Institutions in the area of computer security and adoption of Open Source solutions. His experience and knowledge acquired from Ghana, Mali, Denmark, South Africa, and Malaysia, enables him to interact with people of different cultural backgrounds very well. Skillset: Degrees in IT, Economics, Psychology. Currently pursuing his PhD in Computer Science (Security in Computing field) Certified CEH, CHFI, Hardware repairs and maintenance. Data mining, Office automation, filemaker, Fraud detection, Blockchain, Hardware repairs, Google Power Searcher, Drupal/Laravel/CakePHP developer. Proficient in Python, Ruby, PHP, Java, Solidity, VBA, Google Apps Script, Javascript, HTML, CSS, SQL.
  • Gender
  • Male
  • Teacher's Nationality
  • N/A

Check out more CEH (Certified Ethical Hacker) courses in Malaysia

Corporate Frontier Logo

Certified Ethical Hacker (Certification Program by EC Council)

The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.

by Corporate Frontier [Claim Listing ]
UniKL Logo

Certified Ethical Hacker

Certified Ethical Hacker course is offered by UniKL. Strengthen your resume and broaden your understanding of key concepts to reach your professional and personal goals.

by UniKL [Claim Listing ]
New Horizons Logo

Certified Ethical Hacker v11

Certified Ethical Hacker training course is offered by New Horizons. We are the authorised learning partner to the top technology providers.

by New Horizons [Claim Listing ]
Nexperts Academy Logo

Certified Ethical Hacker (CEH)

The certified ethical hacker (ceh) course offered by nexperts academy is a comprehensive training program designed to equip professionals with the skills and knowledge necessary to identify and prevent potential security threats. The course covers a wide range of topics, including network security,

by Nexperts Academy [Claim Listing ]
Goldentusks Sdn Bhd Logo

Professional Hacker

Certified Ethical Hacker is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems.

by Goldentusks Sdn Bhd [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy