MEIAT brand logo
Middle East Institute for Advanced Training
Certification Body:
MOHERI

About

This course will engage the trainees into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each candidate in-depth knowledge and practical experience with the current essential security systems. This course is also a preparation for EC-Council Certified Ethical Hacker exam 312-50.

  • Candidates will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed.
  • Candidates then learn how intruders escalate privileges and what steps can be taken to secure a system. Candidates will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks,Buffer Overflows and Virus Creation.
  • Introduction
  • Foot-printing & Reconnaissance
  • Network Scanning
  • Enumeration
  • System Hacking
  • Trojan and Backdoors
  • Viruses & Worms
  • Sniffers
  • Social Engineering
  • Denial of Services
  • Session Hijacking
  • Web Servers & Web Applications
  • SQL Injection
  • Hacking wireless networks
  • Evading IDS, Firewalls & Honeypots
  • Buffer Overflow
  • Cryptography
  • Penetration testing
Skills Empowered
Contact us