We've noticed this is not your region.
Redirect me to my region
What do you want to learn today?

Details

This course meets the standards of highly skilled security professionals by providing a comprehensive set of ethical hacking and network security skills, tools and methodologies.

Participants will begin by understanding how perimeter defenses work and will be guided into scanning and attacking their own networks (no real network is harmed). They will then learn how intruders escalate privileges and what steps can be taken to secure their organization’s system.

Participants will also gain in-depth knowledge on intrusion detection, policy creation, social engineering, Distributed Denial-of-Service (DDoS) attacks, buffer overflows and virus creation.

This course will prepare all participants wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

For Whom:

IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security. This course will also prepare professionals wishing to take the EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.

Outline

Learning Objectives:

At the end of the program, participants will be able to:

  • Describe how perimeter defenses function by ethically scanning and attacking networks
  • Conduct information systems security audits by understanding the latest security threats, advanced attack vectors, hacking techniques, methodologies and security measures
  • Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
  • Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
  • Create policies and apply countermeasures against social engineering, Distributed Denial-ofService (DDoS) attacks, buffer overflows, and virus creation
  • Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers
Reviews
Be the first to write a review about this course.
Write a Review

Ciel Consulting is an ICT outsource and training Services Company with headquarters in Port Harcourt Nigeria and affiliates companies in America and Europe.

We offer world class training in Project Management, Primavera p6, Ms Project,AutoCAD (2D and 3D), Telecom, Ethical Hacking, PDMS (Plant Design Management System) as it is known in the 3D CAD industry, is a customizable, multi-user and multi-discipline, engineer controlled design software package for engineering, design and construction projects in, but not limited to, offshore and onshore.

Leading Professional Training and Consultancy firm, Authorized Training Partner of Simplilearn Int'l. Accredited Training and Examination Center

Sending Message
Please wait...
× × Speedycourse.com uses cookies to deliver our services. By continuing to use the site, you are agreeing to our use of cookies, Privacy Policy, and our Terms & Conditions.