Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks. If you use this skills you can not held us responsible.
40 hours-2 classes per week
- Basic Knowledge of Database, Serverside Programming (PHP or JSP or ASP.net) and Basic knowledge of Networking.
- If you do not have the above knowledge, please complete our "INDUSTRY READY" Course (only Module - II & III) to be eligible - https://www.isoeh.com/industry-ready.html
Introduction to Ethical Hacking
Legality and Ethics
Networking & Basics
Trojans & Backdoors
Virus & Worms
Proxy Server & Packet Filtering
Denial of Service Attack
Web Application Vulnerabilities
Web Based password Cracking Techniques
SQL Injection Vulnerabilities
Wireless Network Hacking and Countermeasures
Evading IDS, Firewalls and Detecting Honey Pots
Hacking Database Servers
Hacking Routers and Firewalls
Computer Forensics and Incident Handling
Privacy on the Internet
Creating Security Policies
Fields marked with * are mandatory.