Get Adobe Flash player

Certified Ethical Hacking (CEH)

Ethical hacking is done for the purpose of finding and fixing computer security vulnerabilities in computer systems and networks.
Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only.

Course Outline
1.    Introduction to Ethical Hacking
2.    Footprinting and Reconnaissance
3.    Scanning Networks
4.    Enumeration
5.    System Hacking
6.    Trojans and Backdoors
7.    Viruses and Worms
8.    Sniffers
9.    Social Engineering
10.    Denial of Service
11.    Session Hijacking
12.    Hacking Web-servers
13.    Hacking Web Applications
14.    SQL Injection
15.    Hacking Wireless Networks
16.    Evading IDS, Firewalls, and Honeypots
17.    Buffer Overflow
18.    Cryptography
19.    Penetration Testing

Who's Online

We have 39 guests and no members online