logo

EC-Council Course

course overview

Click to View dates & book now

Overview

This 5-day Certified Ethical Hacker program is the most desired cyber/information security training program aimed at information security professionals. To master hacking technologies, you will need to become one…but an ethical one! This EC Council accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”.

This course will immerse you into the 'Hacker Mindset' in order for you to defend against attacks. The security mindset in any organization must not be limited to the silos of a vendor, technology or piece of equipment.

This ethical hacking course puts you in the driver's seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving an optimal information security posture in any organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and Covering Your Tracks.

Audience

The EC Council Certified Ethical Hacker training course will significantly benefit IT and IS security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

Skills Gained

After completing this course, attendees will:

  • Understand key issues plaguing the information security world, incident management process, and penetration testing.
  • Learn about various types of footprinting, footprinting tools and countermeasures.
  • Learn network scanning techniques and scanning countermeasures.
  • Understand enumeration techniques and enumeration countermeasures.
  • Learn about system hacking methodologies, steganography, steganalysis attacks, and covering tracks.
  • Learn about different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Understand the working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Learn and practice packet sniffing techniques and how to defend against sniffing.
  • Understand Social Engineering techniques, identify theft, and social engineering countermeasures.
  • Learn about DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Understand session hijacking techniques and countermeasures.
  • Understand different types of webserver attacks, attack methodologies, and countermeasures.
  • Learn about different types of web application attacks, web application hacking methodologies and countermeasures.
  • Learn about SQL injection attacks and injection detection tools.
  • Learn about Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Understand mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  • Understand firewalls, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  • Learn about various cloud computing concepts, threats, attacks, and security techniques and tools.
  • Understand different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Analyse various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems.
  • Understand different threats to IoT platforms and learn how to defend IoT devices securely

Outline

After completing this course, attendees will:

  • Understand key issues plaguing the information security world, incident management process, and penetration testing.
  • Learn about various types of footprinting, footprinting tools and countermeasures.
  • Learn network scanning techniques and scanning countermeasures.
  • Understand enumeration techniques and enumeration countermeasures.
  • Learn about system hacking methodologies, steganography, steganalysis attacks, and covering tracks.
  • Learn about different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Understand the working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Learn and practice packet sniffing techniques and how to defend against sniffing.
  • Understand Social Engineering techniques, identify theft, and social engineering countermeasures.
  • Learn about DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Understand session hijacking techniques and countermeasures.
  • Understand different types of webserver attacks, attack methodologies, and countermeasures.
  • Learn about different types of web application attacks, web application hacking methodologies and countermeasures.
  • Learn about SQL injection attacks and injection detection tools.
  • Learn about Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Understand mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  • Understand firewalls, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  • Learn about various cloud computing concepts, threats, attacks, and security techniques and tools.
  • Understand different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Analyse various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems.
  • Understand different threats to IoT platforms and learn how to defend IoT devices securely

Talk to an expert

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. Its a cost effective option. One on one training can be delivered too, at reasonable rates.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

All $ prices are in USD unless it’s a NZ or AU date

SPVC = Self Paced Virtual Class

LVC = Live Virtual Class

Please Note: All courses are availaible as Live Virtual Classes

Trusted by over 1/2 million students in 15 countries

Our clients have included prestigious national organisations such as Oxford University Press, multi-national private corporations such as JP Morgan and HSBC, as well as public sector institutions such as the Department of Defence and the Department of Health.