TRAINING CATEGORIES
(Click Category to List Courses)

42 - IT-S Information Technology - Security and Audit


IT-S 125 - White Hat Ethical Hacking

Code Start Date Duration Venue
IT-S 125 12 August 2024 5 Days Istanbul Registration Form Link
IT-S 125 09 September 2024 5 Days Istanbul Registration Form Link
IT-S 125 07 October 2024 5 Days Istanbul Registration Form Link
IT-S 125 04 November 2024 5 Days Istanbul Registration Form Link
IT-S 125 02 December 2024 5 Days Istanbul Registration Form Link
Please contact us for fees

 

Course Description

An Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). 

White Hat Ethical Hacking Training offers both theoretical and practical classrooms to test vulnerable systems and applications. With the most up-to-date security issues, the participant provides an in-depth knowledge and practical approach to the existing basic security systems.

Course Objectives

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

Who Should Attend?

  • Security officers
  • IS / IT Specialists / Analysts / Managers
  • IS / IT Auditors / Consultants
  • Security Specialists / Analysts
  • Security Managers / Architectures
  • Security Consultants / Professionals
  • Systems Engineers
 

Course Details/Schedule

Day 1

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking

Day 2

  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service

Day 3

  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications

Day 4

  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms

Day 5

  • Evading IDS, Firewalls, and Honeypots
  • Cloud Computing
  • Cryptography