Nigerian Seminars and Trainings

Search conferences, training, seminars, courses and workshops in Nigeria and around the world

business logo

Ethical Hacking (IT Management)

By: Reenel Associates

Abuja FCT, Nigeria

08 - 10 Aug, 2016  3 days

Follow Event

  

NGN 150,000

This training course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies. Participants will begin by understanding how perimeter defences work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system. Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation.

Course Objectives

By the end of the course, participants will be able to:

  • Understand how perimeter defences function by ethically scanning and attacking networks
  • Conduct information systems security audits by understanding the latest security threats, advanced attack vectors, hacking techniques, methodologies and security measures
  • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
  • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
  • Create policies and apply countermeasures against social engineering,
  • Distributed Denial-of Service (DDOS) attacks, buffer overflows, and virus creation
  • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers

Target Competencies

  • Ethical Hacking
  • Information security systems auditing
  • Cyber security
  • Cyber-attack detection
  • Vulnerability assessment
  • Penetration testing

Target Audience

IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

Abuja, Lagos, PH Aug 08 - 10 Aug, 2016
NGN 150,000.00
(Convert Currency)

08053338830

Related Courses
Certified Human Resources Professional: from Traditional HR Role to Business Partner Certified Human Resources Professional: from Traditional HR Role to Business Partner

3 days, 01 - 03 May, 2017 

2017-05-01 12:05:00
Abuja FCT, Nigeria

Reenel Associates

Human resources has to transform itself in order to earn a seat at the decision making table. The door is wide open for human resources to become the business partner it always wanted to be rather ...

Strategy Management in the Public Sector Strategy Management in the Public Sector

3 days, 06 - 08 Nov, 2017 

2017-11-06 12:11:00
Abuja FCT, Nigeria

Reenel Associates

The public sector’s role and its classical paradigm of slow movement is changing. This fast paced change requires a specialized look at the meaning of strategy management in this exciting ...

Employee Relations: Roles and Responsibilities Employee Relations: Roles and Responsibilities

3 days, 01 - 03 May, 2017 

2017-05-01 12:05:00
Abuja FCT, Nigeria

Reenel Associates

Despite the evolution of the functions under human resources, employee relations is still considered to be a grey function. Employee relations staff is expected to administer, report on operational ...

Introduction to Security Management Introduction to Security Management

3 days, 04 - 06 Dec, 2017 

2017-12-04 12:12:00
Abuja FCT, Nigeria

Reenel Associates

This program, delivered by a highly experienced Arabic-speaking security expert, will provide participants with an insight into the fundamentals of managing modern and effective security operations. ...