Search
Generic filters
Topics
Certifications
Industries
Ethical Hacking
overview

This course teaches you the concepts of information and offensive security which are essential to safeguard the security of an enterprise or a personal network. The threats which the world is facing due to the hackers are getting worst day to day. In order to safeguard the data the organizations need ethical hackers who perform a security assessment and take care of the organizational security.

The course covers the major terminologies of offensive security and Enterprise policies, procedures and how CIA is important. Risk assessment, incident response. And the major 5 phases of hacking which covers information gathering, Scanning networks, Gaining access, Maintaining access, Clearing tracks, Malware, Malware analysis, Sniffing, Social engineering, DOs attacks, wireless concepts and web security.

course details
COURSE DURATIONLANGUAGECERTIFICATE
5 DaysEnglishDISS Certificate
 *Please notify us if an interpretation is required 
course benefits/progression opportunities
Course objectives
  • Understand the network functioning in real-time
  • How the data travels and stolen
  • How sniffing of the data done and how to secure it
  • Securing the infrastructure.
  • Penetration testing mechanism.
  • Open source information gathering and identify the traces
  • Usage of metasploit and OSINT Framework
  • Identifying the target vulnerabilities and safeguard the data
  • Scanning procedures on the target using the professional level tools and using the vulnerability exploitation methods.
  • Performing the assessment on a web infrastructure and identifying the vulnerabilities
  • Wireless attacks and safeguarding
  • Performing SQL injection and gathering formation from databases
course outline

Module 1: Introduction to Cybersecurity

Module 2: Footprinting & Cybersecurity

Module 3: Scanning Networks

Module 4: Enumeration

  • Information security overview
  • Elements of Information Security
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concept
  • Information Security Laws & Standards
  • Footprinting Concepts
  • Footprinting through Search Engines & web services
  • Footprinting through Social
  • Networking Sites
  • Email Footprinting
  • Competitive Intelligence
  • Who is Footprinting
  • DNS and Network Whois Footprinting
  • Footprinting through Social Engineering
  • Network Scanning Concept
  • Overview of Network Scanning
  • TCP Communication Flags
  • TCP/IP Communication
  • Scanning Techniques
  • Port Scanning Countermeasures
  • Scanning Beyond IDS and Firewall
  • IDS/Firewall Evasion Techniques
  • Enumeration Concepts
  • What is Enumeration?
  • Techniques for Enumeration
  • Services and Ports to Enumerate
    

Module 5: Vulnerability Analysis

Module 6: System Hacking

Module 7: Malware Threats

Module 8: Sniffing

  • Vulnerability Assessment Concepts
  • Vulnerability Research
  • Vulnerability Classification
  • What is Vulnerability Assessment
  • Types of Vulnerability Assessment
  • Vulnerability-Management Life Cycle
  • Choosing a Vulnerability Assessment Tool
  • Criteria for Choosing a Vulnerability
  • Assessment Tool
  • System Hacking Concepts
  • System Hacking Goals
  • Cracking Passwords
  • Password Cracking
  • Privilege escalation
  • Keyloggers
  • Spyware
  • Hiding files
  • Covering tracks
  • Covering tracks
  • Malware Concepts
  • Introduction to Malware
  • Different Ways a Malware can Get into a System
  • Common Techniques Attackers Use to
    Distribute Malware on the Web
  • Components of Malware
  • Trojan Concepts
  • Virus and Worm Concept
  • Computer Worms
  • Malware analysis
  • Anti-malware software
  • Sniffing Concepts
  • MAC Attacks
  • DHCP Attacks
  • ARP Poisoning
  • Spoofing Attacks
  • DNS Poisoning
  • Countermeasures
    

Module 9: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

  • Social Engineering Concepts
  • Computer-based Social Engineering
  • Mobile-based Social Engineering
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DDoS Attack
  • Detection Techniques
  • DoS/DDoS Countermeasure Strategies
  • DDoS Attack Countermeasures
  • DoS/DDoS Protection Tools
  • Session Hijacking Concepts
  • What is Session Hijacking?
  • Why Session Hijacking is Successful?
  • Session Hijacking Process
  • Packet Analysis of a Local Session Hijack
  • Types of Session Hijacking
  • Session Hijacking in OSI Model
  • Spoofing vs. Hijacking
  • Compromising Session IDs using Sniffing and by Predicting Session Token
  • Session Hijacking Tools
  • Methods to Prevent Session Hijacking
  • IDS, Firewall and Honeypot Concepts
  • Intrusion Detection System (IDS)
  • How IDS Detects an Intrusion
  • Firewall
  • Honeypot
  • IDS Evasion Techniques
  • Firewall Evasion Technique
    

Module 13: Hacking Web Services

Module 14: Hacking Web Applications

Module 15: SQL INJECTION

Module 16: Hacking Wireless Networks

  • Web Server Concepts
  • Web Server Operations
  • Open Source Web Server Architecture
  • IIS Web Server Architecture
  • Web Server Security Issue
  • Why Web Servers Are Compromised?
  • Impact of Web Server Attacks
  • Web Server Attacks
  • Web Server Attack Methodology
  • Countermeasures
  • Patch Management Tools
  • Web Application Security Scanners
  • Web App Concepts
  • Introduction to Web Applications
  • Web Application Architecture
  • OWASP Top 10 Application Security Risks –2017
  • Testing for SQL Injection
  • Additional Methods to Detect SQL Injection
  • Perform Union SQL Injection
  • Testing for SQL Injection
  • Additional Methods to Detect SQL Injection
  • Perform Union SQL Injection
  • Blind SQL injection
  • SQL Countermeasures
  • Testing for SQL Injection
  • Additional Methods to Detect SQL Injection
  • Perform Union SQL Injection
  • Blind SQL injection
  • SQL Countermeasures
  • Wireless Concepts
  • Wireless Terminologies
  • Wireless Networks
  • Wireless Standards
  • Service Set Identifier (SSID)
  • Wi-Fi Authentication Modes
  • Wi-Fi Authentication Process Using a centralized Authentication Server
  • Types of Wireless Antennas
  • Wireless Encryption
  • Types of Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wi-Fi Discovery Tools
  • Wireless Traffic Analysis
  • Choosing the Right Wi-Fi Card
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
    

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking (only Theory)

Module 19: Cloud computing (only theory)

Module 20: Cryptography

  • Mobile Platform Attack Vectors
  • Vulnerable Areas in Mobile Business Environment
  • OWASP Top 10 Mobile Risks – 2016
  • Anatomy of a Mobile Attack
  • How a Hacker can Profit from Mobile when Successfully Compromised
    Mobile Attack Vectors and Mobile
  • Platform Vulnerabilities
  • Security Issues Arising from App Stores
  • Hacking Android OS
  • Android OS
  • Android Rooting
  • Android Rooting Tools
  • Jailbreaking iOS
  • Mobile Spyware
  • Mobile Device Management (MDM)
  • Mobile Device Management Solutions
  • Bring Your Own Device (BYOD)
  • IoT Concepts
  • What is IoT
  • How IoT Works
  • IoT Architecture
  • IoT Application Areas & Devices
  • IoT Technologies & Protocols
  • IoT Communication Models
  • OWASP Top 10 IoT Vulnerabilities & Obstacles
  • IoT Attack Surface Areas
  • IoT Security Tools

 

  • Cloud Computing Concepts
  • Introduction to Cloud Computing
  • Separation of Responsibilities in Cloud
  • Deployment Models
  • NIST Cloud Deployment Reference
  • Architecture
  • Cloud Computing Benefits
  • Understanding Virtualization
  • Cloud Computing Threats
  • Cloud Security
  • NIST Recommendations for Cloud Security
  • Cloud Security Tools
  • Cryptography
  • Concepts Cryptography
  • Types of Cryptography
  • Government Access to Keys (GAK)
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Digital Signature
  • Cryptanalysis
  • Countermeasures

 

COURSE TYPE: CLASSROOM
DATETIME
15 Nov 20208:00 – 14:00 (QATAR)
 9:00 – 15:00 (OMAN)

 

TESTIMONIAL

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name

Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor. Click edit button to change this text. Lorem ipsum dolor sit amet consectetur adipiscing elit dolor

Person name
Meet THE INSTRUCTORS
instructor
Instructor Name
Profession

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

instructor2
Instructor Name
Profession

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Click edit button to change this text. Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.

Related Courses