Description
About this Course
"Know thy enemy". The ICE Malta Ethical Hacking course teaches you how to be a white hat hacker, by teaching you the techniques used by hackers to comprise websites, networks and systems. By learning how they do it, you can secure your infrastructure to withstand such attacks. Via practical workshops, learn the techniques used by black hat hackers including MAC address spoofing, denial of service attacks, social engineering, SQL injection, cross-site scripting and more. Learn the tricks of the trade and make sure you keep abreast with the latest hacking techniques.
This course is ideal for:
- Students who wish to embark on the first step to a career in information security.
- Students who are studying information systems and wish to complement their knowledge with practice on information security.
Course Outline
- Differences between Whitehat and Blackhat hackers.
- Laws and the professional ethics concerned with hacking.
- Public vs private IP addressing.
- Understanding subnetting.
- Understanding ports and well-know application/protocol ports.
- Active information gathering.
- Passive information gathering.
- Google search and social media.
- Network scans.
- Vulnerability scans.
- Ping sweeps.
- Social engineering.
- Different types of scans.
- Using nmap to perform a network scan.
- The 3-way handshake.
- TCP session handling.
- Identify different types of password attacks.
- Cracking techniques.
- Understanding the Windows authentication mechanism.
- Password sniffing.
- Password cracking tools on Linux.
- Understanding sniffing.
- Understanding ARP.
- Active and passive sniffing.
- Using Wireshark to sniff a network and filter information.
- Defining social engineering.
- Social engineering methods.
- Reverse social engineering using social media.
- Cryptographic methods.
- Cryptographic algorithms including AES, RC4, RSA and MD5.
- Symmetric and Asymmetric key encryption/decryption.
- Identify wireless network types.
- Identify wireless network encryption types (WEP & WPA/WPA2).
- Wireless hacking methodology.
- Defending your wireless network from attacks.
Certification
Course Completion Certificate issued by ICE Malta.
Course Details
MODE OF STUDY
Summer Programme 2015 (14+)
DELIVERY METHOD
Lectures, Hands-on Practice & Lab Workshops
ENTRY REQUIREMENTS
- Good Knowledge of English
DURATION
24 Hours (8 Sessions - 3 Hours Per Session)
WHAT'S INCLUDED
- Training by a Fully Qualified Educator
- Detailed Courseware
Price: € 345
"Know thy enemy". The ICE Malta Ethical Hacking course teaches you how to be a white hat hacker, by teaching you the techniques used by hackers to comprise websites, networks and systems. By learning how they do it, you can secure your infrastructure to withstand such attacks. Via practical workshops, learn the techniques used by black hat hackers including MAC address spoofing, denial of service attacks, social engineering, SQL injection, cross-site scripting and more. Learn the tricks of the trade and make sure you keep abreast with the latest hacking techniques.
This course is ideal for:
- Students who wish to embark on the first step to a career in information security.
- Students who are studying information systems and wish to complement their knowledge with practice on information security.
- Differences between Whitehat and Blackhat hackers.
- Laws and the professional ethics concerned with hacking.
- Public vs private IP addressing.
- Understanding subnetting.
- Understanding ports and well-know application/protocol ports.
- Active information gathering.
- Passive information gathering.
- Google search and social media.
- Network scans.
- Vulnerability scans.
- Ping sweeps.
- Social engineering.
- Different types of scans.
- Using nmap to perform a network scan.
- The 3-way handshake.
- TCP session handling.
- Identify different types of password attacks.
- Cracking techniques.
- Understanding the Windows authentication mechanism.
- Password sniffing.
- Password cracking tools on Linux.
- Understanding sniffing.
- Understanding ARP.
- Active and passive sniffing.
- Using Wireshark to sniff a network and filter information.
- Defining social engineering.
- Social engineering methods.
- Reverse social engineering using social media.
- Cryptographic methods.
- Cryptographic algorithms including AES, RC4, RSA and MD5.
- Symmetric and Asymmetric key encryption/decryption.
- Identify wireless network types.
- Identify wireless network encryption types (WEP & WPA/WPA2).
- Wireless hacking methodology.
- Defending your wireless network from attacks.
Course Completion Certificate issued by ICE Malta.
MODE OF STUDY
Summer Programme 2015 (14+)
DELIVERY METHOD
Lectures, Hands-on Practice & Lab Workshops
ENTRY REQUIREMENTS
- Good Knowledge of English
DURATION
24 Hours (8 Sessions - 3 Hours Per Session)
WHAT'S INCLUDED
- Training by a Fully Qualified Educator
- Detailed Courseware