This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50

Target Audience

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.



  • Working knowledge of TCP

Course Outline

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Hacking Laws
  • Module 3: Footprinting
  • Module 4: Google Hacking
  • Module 5: Scanning
  • Module 6: Enumeration
  • Module 7: System Hacking
  • Module 8: Trojans and Backdoors
  • Module 9: Viruses and Worms
  • Module 10: Sniffers
  • Module 11: Social Engineering
  • Module 12: Phishing
  • Module 13: Hacking Email Accounts
  • Module 14: Denial-of-Service
  • Module 15: Session Hijacking
  • Module 16: Hacking Web Servers
  • Module 17: Web Application Vulnerabilities
  • Module 18: Web-Based Password Cracking Techniques
  • Module 19: SQL Injection
  • Module 20: Hacking Wireless Networks
  • Module 21: Physical Security
  • Module 22: Linux Hacking
  • Module 23: Evading IDS, Firewalls and Detecting Honey Pots
  • Module 24: Buffer Overflows
  • Module 25: Cryptography
  • Module 26: Penetration Testing
  • Module 27: Covert Hacking
  • Module 28: Writing Virus Codes
  • Module 29: Assembly Language Tutorial
  • Module 30: Exploit Writing
  • Module 31: Smashing the Stack for Fun and Profit
  • Module 32: Windows Based Buffer Overflow Exploit Writing
  • Module 33: Reverse Engineering
  • Module 34: MAC OS X Hacking
  • Module 35: Hacking Routers, cable Modems and Firewalls
  • Module 36: Hacking Mobile Phones, PDA and Handheld Devices
  • Module 37: Bluetooth Hacking
  • Module 38: VoIP Hacking
  • Module 39: RFID Hacking
  • Module 40: Spamming
  • Module 41: Hacking USB Devices
  • Module 42: Hacking Database Servers
  • Module 43: Cyber Warfare- Hacking, Al-Qaida and Terrorism
  • Module 44: Internet Content Filtering Techniques
  • Module 45: Privacy on the Internet
  • Module 46: Securing Laptop Computers
  • Module 47: Spying Technologies
  • Module 48: Corporate Espionage- Hacking Using Insiders
  • Module 49: Creating Security Policies
  • Module 50: Software Piracy and Warez
  • Module 51: Hacking and Cheating Online Games
  • Module 52: Hacking RSS and Atom
  • Module 53: Hacking Web Browsers (Firefox, IE)
  • Module 54: Proxy Server Technologies
  • Module 55: Data Loss Prevention
  • Module 56: Hacking Global Positioning System (GPS)
  • Module 57: Computer Forensics and Incident Handling
  • Module 58: Credit Card Frauds
  • Module 59: How to Steal Passwords
  • Module 60: Firewall Technologies
  • Module 61: Threats and Countermeasures
  • Module 62: Case Studies
  • Module 63: Botnets
  • Module 64: Economic Espionage
  • Module 65: Patch Management
  • Module 66: Security Convergence
  • Module 67: Identifying the Terrorist

EquiTrain –a pision of Equinox International- equips organizations with IT skills that are the lifeblood of modern corporate life, as Theyll as the professional expertise required for ensuring productivity and to remain competitive now and tomorrow.

At EquiTrain, They tailor end-to-end training solutions that incorporate both IT and business consultancy to the specific needs of each inpidual customer. They can equip yTheir IT professionals with all they need to quickly maximize yTheir new technology investments as Theyll as pushing forward absolute beginners on their road to IT proficiency.

They offer a broad range of IT and Management training cTheirses and certifications from top technology vendors with a choice of on-site or offsite, public or closed and local or abroad training. Their portfolio of cTheirses is supplemented by Their strategic training alliance with world's leading providers of learning solutions.

See all Equitrain courses

Contact information not available.

Courses you can instantly connect with...
Making Powerful Presentations Career Development Organization Soft Skills Native Egyptians Training & Consulting Services Creativity and Innovation Kovay

Is this the right course for you?

Rate our content

Didn't find what you were looking for ?