
A hacker or hacking is the ultimate security professional. Hackers know how to find and exploit vulnerabilities and weaknesses in various systems—just like a malicious hacker. In fact, they both use the same skills; however, an hacker uses those skills in a legitimate, lawful manner to try to find vulnerabilities and fix them before the bad guys can get there and try to break in.
COURSE OUTLINE
System Fundamentals
-
Exploring Network Topologies
-
Working with the Open Systems Interconnection Model
-
Dissecting the TCP/IP Suite
-
IP Subnetting
-
Hexadecimal vs. Binary
-
Exploring TCP/IP Ports
-
Understanding Network Devices
-
Working with MAC Addresses
-
Intrusion Prevention and Intrusion Detection Systems
-
Network Security
-
Knowing Operating Systems
-
Backups and Archiving
Scanning
-
What Is Scanning?
-
Checking for Live Systems
-
Checking the Status of Ports
-
The Family Tree of Scans
-
OS Fingerprinting
-
Countermeasures
-
Vulnerability Scanning
-
Mapping the Network
-
Using Proxies
Cryptography
-
Cryptography: Early Applications and Examples
-
Cryptography in Action
-
Understanding Hashing
-
Issues with Cryptography
-
Applications of Cryptography
Footprinting
-
Understanding the Steps of Ethical Hacking
-
What Is Footprinting?
-
Terminology in Footprinting
-
Threats Introduced by Footprinting
-
The Footprinting Process
Enumeration
-
Linux Basic
-
Enumeration with SNMP
-
Unix and Linux Enumeration
-
LDAP and Directory Service Enumeration
-
Enumeration Using NTP
-
SMTP Enumeration
System Hacking
-
Up to This Point
-
System Hacking
Malware
-
Overt and Covert Channels
Sniffers
-
Understanding Sniffers
-
Using a Sniffer
-
Switched Network Sniffing
Social Engineering
-
What Is Social Engineering?
-
Social Networking to Gather Information?
-
Commonly Employed Threats
-
Identity Theft
Denial of Service
-
Understanding DoS
-
Understanding DDoS
-
DoS Tools
-
DDoS Tools
-
DoS Defensive Strategies
-
DoS Pen-Testing Considerations
Session Hijacking
-
Understanding Session Hijacking
-
Exploring Defensive Strategies
Web Servers and Applications
-
Exploring the Client-Server Relationship
SQL Injection
-
Introducing SQL Injection
Hacking Wi-Fi and Bluetooth
-
What Is a Wireless Network?
Mobile Device Security
-
Mobile OS Models and Architectures
-
Goals of Mobile Security
-
Device Security Models
-
Countermeasures
Evasion
-
Honeypots, IDSs, and Firewalls
Cloud Technologies and Security
-
What Is the Cloud?
-
Physical Security
Hacking Training Course


Program fees
USD 1,690
To register, please click on the tab below, or for further assistance get in touch with us on info@iti.ae , or give us a call at 8004852