$ 1,522.50 Prices include 5% VAT




A hacker or hacking is the ultimate security professional. Hackers know how to find and exploit vulnerabilities and weaknesses in various systems—just like a malicious hacker. In fact, they both use the same skills; however, an hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.

COURSE OUTLINE Hacking Ethical Hacker

System Fundamentals

  • Exploring Network Topologies
  • Working with the Open Systems Interconnection Model
  • Dissecting the TCP/IP Suite
  • IP Subnetting
  • Hexadecimal vs. Binary
  • Exploring TCP/IP Ports
  • Understanding Network Devices
  • Working with MAC Addresses
  • Intrusion Prevention and Intrusion Detection Systems
  • Network Security
  • Knowing Operating Systems
  • Backups and Archiving


  • What Is Scanning?
  • Checking for Live Systems
  • Checking the Status of Ports
  • The Family Tree of Scans
  • OS Fingerprinting
  • Countermeasures
  • Vulnerability Scanning
  • Mapping the Network
  • Using Proxies


  • Cryptography: Early Applications and Examples
  • Cryptography in Action
  • Understanding Hashing
  • Issues with Cryptography
  • Applications of Cryptography


  • Understanding the Steps of Ethical Hacking
  • What Is Footprinting?
  • Terminology in Footprinting
  • Threats Introduced by Footprinting
  • The Footprinting Process


  • Linux Basic
  • Enumeration with SNMP
  • Unix and Linux Enumeration
  • LDAP and Directory Service Enumeration
  • Enumeration Using NTP
  • SMTP Enumeration

System Hacking

  • Up to This Point
  • System Hacking


  • Overt and Covert Channels


  • Understanding Sniffers
  • Using a Sniffer
  • Switched Network Sniffing

Social Engineering

  • What Is Social Engineering?
  • Social Networking to Gather Information?
  • Commonly Employed Threats
  • Identity Theft

Denial of Service

  • Understanding DoS
  • Understanding DDoS
  • DoS Tools
  • DDoS Tools
  • DoS Defensive Strategies
  • DoS Pen-Testing Considerations

Session Hijacking

  • Understanding Session Hijacking
  • Exploring Defensive Strategies

Web Servers and Applications

  • Exploring the Client-Server Relationship

SQL Injection

  • Introducing SQL Injection

Hacking Wi-Fi and Bluetooth

  • What Is a Wireless Network?

Mobile Device Security

  • Mobile OS Models and Architectures
  • Goals of Mobile Security
  • Device Security Models
  • Countermeasures


  • Honeypots, IDSs, and Firewalls

Cloud Technologies and Security

  • What Is the Cloud?
  • Physical Security


There are no reviews yet.

Be the first to review “Hacking”