TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 115 - Ethical Hacking

Code Start Date Duration Venue
IT-S 115 29 April 2024 5 Days Istanbul Registration Form Link
IT-S 115 06 May 2024 5 Days Istanbul Registration Form Link
IT-S 115 03 June 2024 5 Days Istanbul Registration Form Link
IT-S 115 29 July 2024 5 Days Istanbul Registration Form Link
IT-S 115 26 August 2024 5 Days Istanbul Registration Form Link
IT-S 115 23 September 2024 5 Days Istanbul Registration Form Link
IT-S 115 21 October 2024 5 Days Istanbul Registration Form Link
IT-S 115 18 November 2024 5 Days Istanbul Registration Form Link
IT-S 115 16 December 2024 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

The aim of the course is to prepare participants to ethical hacking certification, as well as help them to gain insight about IT hacking world.

An ethical hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The program prepares individuals in the specific network security discipline for Ethical Hacking from a vendor-neutral perspective.

Course Objectives

  • Establishing and governing minimum standards for credentialing professional information security specialists in ethical hacking measures
  • Informing the public that credentialed individuals meet or exceed the minimum standards
  • Reinforcing ethical hacking as a unique and self-regulating profession

Who Should Attend?

  • Network/System Administrators/Engineers
  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • Those concerned about the security of the network infrastructure

Course Details/Schedule

Day 1

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration

Day 2

  • System Hacking
  • Malware Threats
  • Sniffing

Day 3

  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Webservers

Day 4

  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms

Day 5

  • Evading IDS, Firewalls and Honeypot
  • Cloud Computing
  • Cryptography