This training course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies. Participants will begin by understanding how perimeter defences work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system. Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation.
By the end of the course, participants will be able to:
- Understand how perimeter defences function by ethically scanning and attacking networks
- Conduct information systems security audits by understanding the latest security threats, advanced attack vectors, hacking techniques, methodologies and security measures
- Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
- Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
- Create policies and apply countermeasures against social engineering,
- Distributed Denial-of Service (DDOS) attacks, buffer overflows, and virus creation
- Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers
- Ethical Hacking
- Information security systems auditing
- Cyber security
- Cyber-attack detection
- Vulnerability assessment
- Penetration testing
IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.