IT Security
Learn hacking techniques with the purposes of finding and fixing computer security vulnerabilities.
Prerequisites:
Networking or relevant information security.
Acquired Skills:
At the end of this course, the student will have acquired the skills to run a penetration test by request of the owner of the targeted system(s).
Curriculum Material:
The language and teaching techniques are geared to the course’s final use. It includes explanatory exercises and examples.
Course Topics:
- Hacking Laws
- Footprinting
- Google Hacking
- Scanning
- Enumeration
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffers
- Social Engineering
- Phishing
- Hacking Email Accounts
- Denial of Service
- Session Hijacking
- Hacking Webservers
- Web Application Vulnerabilities
- Web Based Password Cracking Techniques
- SQL Injection
- Hacking Wireless Networks - Back Track
- Physical Security
- Linux Hacking (Detecting and blocking Httptunnel)
- Command Prompt (DOS)
- Evading IDS, Honeypots and Firewalls
- Buffer Overflows
- Cryptography
- Penetration Testing Methodologies
- Covert Hacking
- MAC OS Hacking
- Kali Linux and Backtrack Network Security Assessments
Certificate of Completion
At the end of the course the student will receive our certificate of completion for this training.