TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 120 - White Hat Ethical Hacking Training with Laboratory Environment

Code Start Date Duration Venue
IT-S 120 15 April 2024 5 Days Istanbul Registration Form Link
IT-S 120 13 May 2024 5 Days Istanbul Registration Form Link
IT-S 120 10 June 2024 5 Days Istanbul Registration Form Link
IT-S 120 08 July 2024 5 Days Istanbul Registration Form Link
IT-S 120 05 August 2024 5 Days Istanbul Registration Form Link
IT-S 120 02 September 2024 5 Days Istanbul Registration Form Link
IT-S 120 28 October 2024 5 Days Istanbul Registration Form Link
IT-S 120 25 November 2024 5 Days Istanbul Registration Form Link
IT-S 120 23 December 2024 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

White Hat Hacker Training in the Laboratory Environment is an information security and ethical hacking training. This training is designed for security experts who want to promote themselves in the security world. It offers the latest hacking tools and techniques on the field and simulates the full penetration test from start to finish. By injecting yourself into a different and vulnerable network, you will have a hands on experience.

With this training, you can fully explore and benefit from our virtual penetration testing lab environment.

Participants need to have certain knowledge of TCP / IP, networking and competence as well as Linux knowledge before participating in the training.

Course Objectives

  • Provide the experience of real penetration testing in the lab environment by creating an ethical hacking methodology.

Who Should Attend?

  • Security Engineers
  • IS / IT Specialists / Analysts / Managers
  • Security Specialists / Analysts
  • Security Managers / Architectures
  • Security Consultants / Professionals

Course Details/Schedule

Day 1

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking

Day 2

  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service

Day 3

  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications

Day 4

  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms

Day 5

  • Evading IDS, Firewalls, and Honeypots
  • Cloud Computing
  • Cryptography