Ethical Hacking and Countermeasures v8 June 1-5, 2015 | 5days | 8am-4pm Training fee: Php86,625+VAT/pax
FREE EXAM RETAKE & EC-COUNCIL iLAB ACCESS FOR 6 MONTHS
Course Description: This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5-day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
Who Should Attend: This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Prerequisites: Students taking the CEH course must have several years of information technology, TCP/IP and a general technical background. In addition, the student needs extensive training in Linux basic skills, IP addressing, Configuring Routing, and Linux Compiling running programs. Or CompTIA Network+ and Security+.
Course Outline: Module 01: Introduction to Ethical Hacking Module 02: Footprinting and Reconnaissance Module 03: Scanning Networks Module 04: Enumeration Module 05: System Hacking Module 06: Trojans and Backdoors Module 07: Viruses and Worms Module 08: Sniffers Module 09: Social Engineering Module 10: Denial of Service Module 11: Session Hijacking Module 12: Hacking Webservers Module 13: Hacking Web Applications Module 14: SQL Injection Module 15: Hacking Wireless Networks Module 16: Hacking Mobile Platforms Module 17: Evading IDS, Firewalls, and Honeypots Module 18: Buffer Overflow Module 19: Cryptography Module 20: Penetration Testing
This seller has been a member since: May. 27, 2015
Total Classifieds: 20
Why seller feedback is important?
Transact with most credible & reputable sellers
Know the seller you are going to deal with
Claim warranty long after purchasing the item
Warn you and other buyers against scams
Motivates sellers to provide good service
We are one of the largest free online selling communities with thousands of active sellers.
Do you have something to sell? Your next sale might be just a few clicks away.
Based from 881 member feedbacks. We value your suggestions and use it.
100% Filipino-owned. Free Forever.