top of page
  • Whatsapp
  • Instagram
  • Facebook
  • Twitter
  • LinkedIn
  • YouTube

A hacker or hacking is the ultimate security professional. Hackers know how to find and exploit vulnerabilities and weaknesses in various systems—just like a malicious hacker. In fact, they both use the same skills; however, an hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.

 COURSE OUTLINE 

 

System Fundamentals

  • Exploring Network Topologies

  • Working with the Open Systems Interconnection Model

  • Dissecting the TCP/IP Suite

  • IP Subnetting

  • Hexadecimal vs. Binary

  • Exploring TCP/IP Ports

  • Understanding Network Devices

  • Working with MAC Addresses

  • Intrusion Prevention and Intrusion Detection Systems

  • Network Security

  • Knowing Operating Systems

  • Backups and Archiving

 

Scanning

  • What Is Scanning?

  • Checking for Live Systems

  • Checking the Status of Ports

  • The Family Tree of Scans

  • OS Fingerprinting

  • Countermeasures

  • Vulnerability Scanning

  • Mapping the Network

  • Using Proxies

 

Cryptography

  • Cryptography: Early Applications and Examples

  • Cryptography in Action

  • Understanding Hashing

  • Issues with Cryptography

  • Applications of Cryptography

 

Footprinting

  • Understanding the Steps of Ethical Hacking

  • What Is Footprinting?

  • Terminology in Footprinting

  • Threats Introduced by Footprinting

  • The Footprinting Process

 

Enumeration

  • Linux Basic

  • Enumeration with SNMP

  • Unix and Linux Enumeration

  • LDAP and Directory Service Enumeration

  • Enumeration Using NTP

  • SMTP Enumeration

 

System Hacking

  • Up to This Point

  • System Hacking

 

Malware

  • Overt and Covert Channels

 

Sniffers

  • Understanding Sniffers

  • Using a Sniffer

  • Switched Network Sniffing

 

Social Engineering

  • What Is Social Engineering?

  • Social Networking to Gather Information?

  • Commonly Employed Threats

  • Identity Theft

 

Denial of Service

  • Understanding DoS

  • Understanding DDoS

  • DoS Tools

  • DDoS Tools

  • DoS Defensive Strategies

  • DoS Pen-Testing Considerations

 

Session Hijacking

  • Understanding Session Hijacking

  • Exploring Defensive Strategies

 

Web Servers and Applications

  • Exploring the Client-Server Relationship

 

SQL Injection

  • Introducing SQL Injection

 

Hacking Wi-Fi and Bluetooth

  • What Is a Wireless Network?

 

Mobile Device Security

  • Mobile OS Models and Architectures

  • Goals of Mobile Security

  • Device Security Models

  • Countermeasures

 

Evasion

  • Honeypots, IDSs, and Firewalls

 

Cloud Technologies and Security

  • What Is the Cloud?

  • Physical Security

Hacking Training Course

Program fees

USD 1,690

To register, please click on the tab below, or for further assistance get in touch with us on info@iti.ae , or give us a call at 8004852

bottom of page