5 Day(s)


  • Scanning system resources with advanced IP scanner
  • Creating a virus using the JPS Virus Maker tool
  • Detecting phishing with Netcraft and PhishTank
  • Implementing the Burp Suite to test web applications
  • Applying Intrusion Detection Systems (IDS)
  • Encrypting data to prevent unauthorized access

Your Choice

Customize your hands-on Learning Method with your choice of PC usage: Pair Up or Sole Use. Learn More ยป


Security officers, auditors, security professionals, site administrators and anyone tasked with protecting the integrity of the network infrastructure.

Skills Gained

  • Apply countermeasures to secure your system against threats and attacks
  • Test access to your organizational data using ethical hacking techniques
  • Implement real-world hacking techniques to test the security of your systems
  • Employ complex tools to identify and analyze your company's risks and weaknesses
  • Uncover vulnerabilities in a network infrastructure and determine appropriate countermeasures

Course Specifics

Course Outline

Ethical Hacking Fundamentals

Considering the effects of hacking
  • Reviewing the elements of information security
  • The security, functionality and usability triangle
Outlining the role of hackers
  • Reconnaissance
  • Scanning
  • Gaining access
  • Maintaining access
  • Covering tracks
  • Identifying attack types: operating system, application level, shrink-wrap code and misconfiguration
Functions of an ethical hacker
  • Conducting vulnerability research
  • Assessing the methodology of penetration testing

Applying Covert Techniques to Scan and Attack a Network

Footprinting and reconnaissance
  • Objectives and methods of footprinting
  • Searching for and collecting a company's information
  • Employing footprinting countermeasures
Scanning networks
  • Adopting multiple scanning techniques
  • Identifying IDS-evasion and IP-fragmentation tools
  • Leveraging vulnerability scanning tools
  • Applying IP spoofing detection
Examining enumeration techniques
  • Enumerating user accounts using default passwords
  • Simple Network Management Protocol (SNMP) enumeration

Analyzing System Risks and Weaknesses to Apply Countermeasures

System hacking
  • CEH Hacking Methodology (CHM)
  • Cracking passwords and executing applications
  • Defending against password cracking, keyloggers, spyware and rootkits
Uncovering Trojans and backdoors
  • Detecting a Trojan attack
  • Scanning for suspicious entries, services, programs
Dissecting viruses, worms and sniffers
  • Recognizing key indicators of a virus attack
  • Writing a simple virus program
  • Analyzing worms and malware
Social engineering and Denial of Service (DoS)
  • Targets, intrusion tactics and strategies for prevention
  • Mitigating the risks of social networking to networks
  • Recognizing symptoms and techniques of a DoS attack
  • Implementing tools to defend against DoS attacks

Assessing and Preventing Gaps in a Network Infrastructure

Hacking web applications and wireless networks
  • Cross-Site Scripting (XSS) and web application DoS attacks
  • Encoding schemes to defend against SQL injection, command injection, web services and other attacks
Hijacking sessions and web servers
  • Spoofing vs. hijacking
  • Protecting against and preventing hijacking by implementing appropriate countermeasures
Evading IDS, firewalls and honeypots
  • Considering varying types of intrusion detection systems (IDS) and tools
  • Bypassing firewalls and blocked sites
Buffer overflow and cryptography
  • Exploiting semantic comments in annotations
  • Cryptography attacks and code breaking methodologies

Performing Penetration Testing

  • Performing security and vulnerability assessments
  • Determining testing points and locations
  • Announced vs. unannounced testing

Thinking about Onsite?

If you need training for 3 or more people, you should ask us about onsite training. Putting aside the obvious location benefit, content can be customised to better meet your business objectives and more can be covered than in a public classroom. It's a cost effective option.

Submit an enquiry from any page on this site, and let us know you are interested in the requirements box, or simply mention it when we contact you.

Upcoming Dates

Course Location Days Cost Date
5 2827 £2827 2018-09-12
5 1950 £1950 2018-03-19
5 2445 £2445 2018-03-19
5 2827 £2827 2018-02-12
5 2827 £2827 2018-02-12
5 2445 £2445 2018-01-22
5 1950 £1950 2018-01-22
5 2827 £2827 2017-12-11
5 2827 £2827 2017-12-11
5 2827 £2827 2017-12-11
5 2445 £2445 2017-11-20
5 1950 £1950 2017-11-20
5 2827 £2827 2017-09-25
5 2827 £2827 2017-09-25
5 1950 £1950 2017-09-18
5 2445 £2445 2017-09-18
5 2195 £2195 2017-09-18