Courses
Enquiry
Ethical Hacking is the process of breaking into an organization's IT networks and systems to test their weakness and vulnerabilities. There are five phases in hacking. They include reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Hackers use various hacking tools and techniques in each of these phases.
Ethical hackers conduct vulnerability assessment, risk assessment, penetration testing and system protection tests and fix security issues before they are exploited by hackers with malicious intent.
The course aims to train students how to use hacking tools and techniques to assess the security posture of a given IT network or system. Upon completing the course, students will be able to scan, test, hack and secure IT systems. They will be given hands-on training in penetration testing and other testing methodologies to ensure the security of an organization's information systems.
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Hacking Web Server
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
Evading IDS, Firewalls & Honeypot
Cloud Computing
Cryptography
Graduates with basic computer skills and strong Knowledge in TCP/IP can benefit from the course and student/Professional concerned with secure programming and the integrity of the network infrastructure.
IT and other business organizations hire ethical hackers to enhance their network security. Some of the jobs available for ethical hackers include: Information Security & Governance Specialist, Pentester/ IT Security Professional, Cyber Security Professional, Security Consultant, Security Advisors, IT Specialists, IT System Executives, and IT Consultants.