Objective: This Course will immerse the participants into an interactive environment where
they will be shown how to scan, test, hack and secure their own systems. This course gives
each participant’s in-depth knowledge and practical experience with the current essential
security systems. Participants will begin by understanding how perimeter defenses work and
then be lead into scanning and attacking their own networks, no real network is harmed.
Participant’s then learned how intruders escalate privileges and what steps can be taken to
secure a system. Participants will also learn about Intrusion Detection, Policy Creation,
Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation.
|Introduction to Ethical Hacking|
|Footprinting and Reconnaissance|
|Evading IDS, Firewalls, and Honeypots|
|Hacking Web Servers|
|Hacking Web Applications|
|Hacking Wireless Networks|
|Hacking Mobile Platforms|
|Kali Linux Basic Review & demonstration with Vulnerability Assessment and Penetration Testing in practical life using free tools available on Kali Linux.|