background

Home / IT Certification Training / Security / Ethical Hacking | Rooman Technologies

Image

Ethical hacker

Ethical hackers (also known as penetration testers) are employed to conduct penetration tests – controlled hacks – on businesses to test systems and find vulnerabilities. Unlike ‘black hat’ hackers, ethical hackers are security professionals able to provide the knowledge and skills needed to fix flaws before they can be exploited. Businesses that hire ethical hackers get specialist insights from the perspective of an intruder. With this knowledge, businesses can fix vulnerabilities and boost their cyber defenses.

Audience:

WORKING PROFESSIONALS

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.

Prerequisite:

  • Basic knowledge of Networking, TCP/IP and operating systems
  • Knowledge of Server and Network Components

Duration:

Total duration – 80 Hrs.
Part time - 40 days, 2hours/day.
Full time - 10 days, 8hrs/day.

Key Benefits:

Ethics and Legality, Foot printing and Reconnaissance, Scanning Networks, Sniffers, Enumeration, Vulnerability Analysis, Wireless Hacking, Virus and Worms, System Hacking, Malware Threats, Session Hijacking, Evading IDS, Honeypots, and Firewalls, Hacking Web Servers, Cryptography, Penetration Testing Methodologies.

Course Outline:

312 – 50 (ECC Exam): EC-Council Certified Ethical Hacker

  • Introduction to Ethical Hacking, Ethics, and Legality
  • Gathering Target Information: Reconnaissance, Foot printing, and Social Engineering
  • Gathering Network and Host Information: Scanning and Enumeration
  • System Hacking: Password Cracking, Escalating Privileges, and Hiding Files
  • Trojans, Backdoors, Viruses, and Worms
  • Gathering Data from Networks: Sniffers
  • Denial of Service and Session Hijacking
  • Web Hacking: Google, Web Servers, Web Application Vulnerabilities, and Web-Based Password Cracking Techniques
  • Attacking Applications: SQL Injection and Buffer Overflows
  • Wireless Network Hacking
  • Physical Site Security
  • Hacking Linux Systems
  • Bypassing Network Security: Evading IDSs, Honeypots, and Firewalls
  • Cryptography
  • Performing a Penetration Test

CAREER PROSPECTS:

  • Penetration Tester
  • Site Administrator
  • Security Administrator
  • Ethical Hacker
  • IT Auditor
  • Network Security Specialist