Loader
Course Image

Course Description

Overview             

This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding a large salary. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.

Learning with Study 365 has many advantages. The course material is delivered straight to you and can be adapted to fit in with your lifestyle. It is created by experts within the industry, meaning you are receiving accurate information, which is up-to-date and easy to understand.

This course is comprised of professionally narrated e-Learning modules, interactive quizzes, tests, and exams. All delivered through a system that you will have access to 24 hours a day, 7 days a week for 365 days (12 months).

Overview              This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding a large salary. This course is also the...

Read More

Course Content

Course Curriculum

Free Introduction1: Intro to Course2: Footprinting and Reconnaisssance3: Scanning Networks4: Enurmeration5: System Hacking6: Trojans and Backdoors7: Viruses and Worms8: Denial of Service9: Social Engineering10: Sniffers11: Session Hijacking12: Hacking Webservers13: Hacking Web Applications14: SQL Injection15: Hacking Wireless Networks16: Evading IDS Firewalls and Honeypots17: Buffer Overflow18: Cryptography19: Penetration Testing

Course Reviews

Course Curriculum Free Introduction1: Intro to Course2: Footprinting and Reconnaisssance3: Scanning Networks4: Enurmeration5: System Hacking6: Trojans and Backdoors7: Viruses and Worms8: Denial of Service9: Social Engineering10: Sniffers11: Session Hijacking12: Hacking Webservers13: Hacking Web Applications14: SQL Injection15: Hacking Wireless Networks16: Evading IDS Firewalls and...

Read More

Entry Requirements

Entry Requirement:

Learners must be age 16 or over and should have a basic understanding of the English Language, numeracy, literacy, and ICT.

Entry Requirement:

Learners must be age 16 or over and should have a basic understanding of the English Language, numeracy, literacy, and ICT.

Assessment Methods

Method of Assessment:

At the end of the course, learners will take an online multiple choice question assessment test (please be aware, this is not the official exam). The online test is marked straight away, so you will know immediately if you have passed the course.
 

Method of Assessment:

At the end of the course, learners will take an online multiple choice question assessment test (please be aware, this is not the official exam). The online test is marked straight away, so you will know immediately if you have passed the course.
 

Additional Information

Certification:

Successful candidates will be awarded a certificate for Ethical Hacking Essential Training.

(This course is not included the official certificate)

Certification:

Successful candidates will be awarded a certificate for Ethical Hacking Essential Training.

(This course is not included the official certificate)

Related Courses