Ethical Hacking

What’s the course about?

Ethical Hacking is the process of breaking into an organization's IT networks and systems to test their weakness and vulnerabilities. There are five phases in hacking. They include reconnaissance, gaining access, enumeration, maintaining access, and covering tracks. Hackers use various hacking tools and techniques in each of these phases.

Ethical hackers conduct vulnerability assessment, risk assessment, penetration testing and system protection tests and fix security issues before they are exploited by hackers with malicious intent.

Ethical Hacking Image

Course Objective :

The course aims to train students how to use hacking tools and techniques to assess the security posture of a given IT network or system. Upon completing the course, students will be able to scan, test, hack and secure IT systems. They will be given hands-on training in penetration testing and other testing methodologies to ensure the security of an organization's information systems.

Key course content

 Introduction to Ethical Hacking

 Footprinting and Reconnaissance

 Scanning Networks

 Enumeration

 System Hacking

 Malware Threats

 Sniffing

 Social Engineering

 Denial-of-Service

 Session Hijacking

 Hacking Web Server

 Hacking Web Applications

 SQL Injection

 Hacking Wireless Networks

 Hacking Mobile Platforms

 Evading IDS, Firewalls & Honeypot

 Cloud Computing

 Cryptography

Who can enroll

Graduates with basic computer skills and strong Knowledge in TCP/IP can benefit from the course and student/Professional concerned with secure programming and the integrity of the network infrastructure.

Job opportunities

IT and other business organizations hire ethical hackers to enhance their network security. Some of the jobs available for ethical hackers include: Information Security & Governance Specialist, Pentester/ IT Security Professional, Cyber Security Professional, Security Consultant, Security Advisors, IT Specialists, IT System Executives, and IT Consultants.