practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

  • Buffer Overflows
  • Cryptography
  • Penetration Testing
  • Privacy on the Internet
  • Introduction to Ethical Hacking
  • Covert Hacking
  • Securing Laptop Computers
  • Hacking Laws
  • Writing Virus Codes
  • Spying Technologies
  • Foot printing
  • Assembly Language
  • Corporate Espionage
  • Google Hacking
  • Tutorial
  • – Hacking Using Insiders
  • Scanning
  • Exploit Writing
  • Creating Security Policies
  • Enumeration
  • Smashing the Stack for Fun
  • Software Piracy and Warez
  • System Hacking
  • and Profit
  • Hacking and Cheating
  • Trojans and Backdoors
  • Windows Based Buffer
  • Online Games
  • Viruses and Worms
  • Overflow Exploit Writing
  • Hacking RSS and Atom
  • Sniffers
  • Reverse Engineering
  • Hacking Web Browsers
  • Social Engineering
  • Macintosh Hacking
  • Proxy Server Technologies
  • Phishing
  • Hacking Routers, cable
  • Data Loss Prevention
  • Hacking Email Accounts
  • Modems and Firewalls
  • Hacking Global Positioning
  • Denial-of-Service
  • Hacking Mobile Phones,
  • System (GPS)
  • Session Hijacking
  • PDA and Handheld Devices
  • Computer Forensics and
  • Hacking Web Servers
  • Bluetooth Hacking
  • Incident Handling
  • Web Application Vulnerabilities
  • VolP Hacking n RFID
  • Credit Card Frauds
  • Web-Based Password Cracking
  • Hacking
  • How to Steal Passwords
  • Techniques
  • Spamming
  • Firewall Technologies
  • SQL Injection
  • Hacking USB Devices
  • Threats and
  • Hacking Wireless Networks
  • Hacking Database Servers
  • Countermeasures
  • Physical Security
  • Cyber Warfare – Hacking,
  • Case Studies D Botnets
  • Linux Hacking
  • AI Qaida and Terrorism
  • Economic Espionage
  • Evading IDS, Firewalls and
  • Internet Content Filtering
  • Patch Management
  • Detecting Honey Pots
  • Techniques
  • Security Convergence