AUCKLAND (09) 378-0411       HAMILTON (07) 838-0700       WELLINGTON (04) 472-4830      CHRISTCHURCH (03) 365-5020      |      
Home Courses CEHV9: Certified Ethical Hacker Course

Courses


CEHV9: Certified Ethical Hacker Course

Length: 5    Cost: $3,995 + GST    Version: EC

= Scheduled class    = Guaranteed to run    = Fully booked
Click on the dates to book online
CentreAprMayJunJul
Auckland----
11
--
Hamilton--------
Christchurch--------
Wellington------
31

Can't find a class in your area? Contact our sales team and request a class date.


About this Course

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student indepth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.



Audience


This course will significantly benefit security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

Prerequisites

Networking experience
Some Linux experience is beneficial as Linux command line will be covered in the course
ICND1 or equivalent skills
Windows Server Experience
TCP/UDP/IP experience
Experience with virtual machines

At Course Completion

Students are able to apply countermeasure to secure organization_s system against threats and attacks
Students are able to test the access to organizational data using ethical hacking techniques
Students are able to implement real-world hacking techniques to test the security of organization_s system
Students are able to employ complex tools to identify and analyze your company_s risks and weaknesses
Students are able to uncover vulnerabilities in a network infrastructure and determine appropriate countermeasures

Course Outline


1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Trojans and Backdoors
7. Viruses and Worms
8. Sniffers
9. Social Engineering
10. Denial of Service
11. Session Hijacking
12. Hacking Webservers
13. Hacking Web Applications
14. SQL Injection
15. Hacking Wireless Networks
16. Hacking Mobile Platforms
17. Evading IDS, Firewalls and Honeypots
18. Buffer Overflows
19. Cryptography
20. Penetration Testing


 Print this page