Ethical Hacking Online Training | Crescent Technology Consultants

Ethical Hacking

ethical-hacking

Security will always be an integral part of any network infrastructure or web-based application. We offer a wide range of courses in Information Security. Starting from Ethical Hacking and countermeasures to hardcore courses of performing penetration testing with Backtrack giving you a solid understanding of penetration testing process which is equally important for those wanting to either defend or attack their network.


Ethical Hacking & Countermeasures (CEHv7):

Ethical Hacking Course more emphasis on techniques and methodologies, which attackers may use to carry out possible attacks against system/networks. This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.


Course Content:
  • Introduction to Ethical Hacking
  • Foot-printing and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing

Pre-Requisite:


Candidates who have understanding of Windows and/or Linux Operating System and overview of Networking will be an added advantage.