- January 26, 2017
- Posted by: SouTech Team
- Category: Blog, Cyber-security and Ethical Hacking Training
This course is very important and with proper training you can become any of the following:
Job Roles after taking the course
- Security Analyst
- Security Operations Center (SOC) Analyst
- Vulnerability Analyst
- Cybersecurity Specialist
- Threat Intelligence Analyst
- Security Engineer
Training Program Course Description:
The Ethical Hacker-Cyber warfare course through SOUTECH Academy will help trainees to stop hackers, terrorists by learning to think like one. This class immerses participants in an interactive environment where they will scan, test, hack, and secure their own systems. Candidates will learn how intruders escalate privileges and what steps can be taken to secure a system. Also covered will be Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. All participants will leave the class with a detailed plan on conducting vulnerability assessments and penetration tests and apply it to counter terrorism measures.
Who Should Attend?
- Computer Forensics/Digital Forensics Professionals
- Incident Response Personnel
- Military Personnel
- Information Security Professionals
- IT Managers
- Law Enforcement Personnel
- Legal Professionals
- Network Administrators and Architects
- System Administrators
Module 1: Introduction to Ethical Hacking, Counter Terrorism
- Information Security Overview
- Information Security Threats and Attack Vectors
- Hacking Concepts, Types, and Phases
- Ethical Hacking Concepts and Scope
- Information Security Controls
- Information Security Laws and Standards
Module 2: Footprinting and Reconnaissance
- Footprinting Concepts
- Footprinting Methodology
- Footprinting Tools
- Footprinting Countermeasures
- Footprinting Penetration Testing
Module 3: Scanning Networks
- Overview of Network Scanning
- Scanning Methodology
Module 4: Enumeration
- Enumeration Concepts
- NetBIOS Enumeration
- SNMP Enumeration
- LDAP Enumeration
- NTP Enumeration
- SMTP Enumeration
- Enumeration Countermeasures
- SMB Enumeration Countermeasures
- Enumeration Pen Testing
Module 5: System Hacking
- Information at Hand Before System Hacking Stage
- System Hacking: Goals
- Hacking Methodology (CHM)
- System Hacking Steps
- Hiding Files
- Covering Tracks
- Penetration Testing
Module 6: Malware Threats
- Introduction to Malware
- Trojan Concepts
- Types of Trojans
- Virus and Worms Concepts
- Malware Reverse Engineering
- Malware Detection
- Countermeasures
- Anti-Malware Software
- Penetration Testing
Module 7: Sniffing
- Sniffing Concepts
- MAC Attacks
- DHCP Attacks
- ARP Poisoning
- Spoofing Attack
- DNS Poisoning
- Sniffing Tools
- Sniffing Tool: Wireshark
- Follow TCP Stream in Wireshark
- Display Filters in Wireshark
- Additional Wireshark Filters
- Sniffing Tool
- Packet Sniffing Tool: Capsa Network Analyzer
- Network Packet Analyzer
- Counter measures
- Sniffing Detection Techniques
- Sniffing Pen Testing
Module 8: Social Engineering
- Social Engineering Concepts
- Social Engineering Techniques
- Impersonation on Social Networking Sites
- Identity Theft
- Social Engineering Countermeasures
- Penetration Testing
Module 9: Denial-of-Service
- DoS/DDoS Concepts
- DoS/DDoS Attack Techniques
- Botnets
- DDoS Case Study
- DoS/DDoS Attack Tools
- Counter-measures
- DoS/DDoS Protection Tools
- DoS/DDoS Attack Penetration Testing
Module 10: Session Hijacking
- Session Hijacking Concepts
- Application Level Session Hijacking
- Network-level Session Hijacking
- Session Hijacking Tools
- Counter-measures
- Session Hijacking Pen Testing
Module 11: Hacking Webservers
- Webserver Concepts
- Webserver Attacks
- Attack Methodology
- Webserver Attack Tools
- Counter-measures
- Patch Management
- Webserver Security Tools
- Webserver Pen Testing
Module 12: Hacking Web Applications
- Web App Concepts
- Web App Threats
- Web App Hacking Methodology
- Web Application Hacking Tools
- Countermeasures
- Security Tools
- Web App Pen Testing
Module 13: SQL Injection
- SQL Injection Concepts
- Types of SQL Injection
- SQL Injection Methodology
- SQL Injection Tools
- Evasion Techniques
- Counter-measures
Module 14: Hacking Wireless Networks
- Wireless Concepts
- Wireless Encryption
- Wireless Threats
- Wireless Hacking Methodology
- Wireless Hacking Tools
- Bluetooth Hacking
- Counter-measures
- Wireless Security Tools
- Wi-Fi Pen Testing
Module 15: Hacking Mobile Platforms
- Mobile Platform Attack Vectors
- Hacking Android OS
- Hacking iOS
- Hacking Windows Phone OS
- Hacking BlackBerry
- Mobile Device Management (MDM)
- Mobile Security Guidelines and Tools
- Mobile Pen Testing
Module 16: Evading IDS, Firewalls, and Honeypots
- IDS, Firewall and Honeypot Concepts
- IDS, Firewall and Honeypot System
- Evading IDS
- Evading Firewalls
- IDS/Firewall Evading Tools
- Detecting Honeypots
- IDS/Firewall Evasion Counter-measures
- Penetration Testing
Module 17: Cloud Computing
- Cloud Computing Threats
- Cloud Computing Attacks
- Cloud Security
- Cloud Security Tools
- Cloud Penetration Testing
Module 18: Cryptography
- Market Survey 2014: The Year of Encryption
- Case Study: Heartbleed
- Case Study: Poodlebleed
- Cryptography Concepts
- Encryption Algorithms
- Cryptography Tools
- Public Key Infrastructure(PKI)
- Email Encryption
- Disk Encryption
- Cryptography Attacks
- Cryptanalysis Tools
Module 19: Application of Ethical Hacking Skills to Nigerian Cyber Survelliance Drive
- Overview of Skill Set
- Nigerian Terrorism, Groups, Actions, Footprints
- Cyber warfare Strategy Development
- Cyber Interception/ Surveillance Roadmap and Implementation
- Achieving Results and Metrics for Analysis, Reporting and Awareness
Venue: SOUTECH VENTURES, Kano street, After Shagari Mosque, Area 1, Abuja.
- Real-life application and understanding
- Conducive learning environment
- Participants get a Certificate of Training
- Restricted and interactive classes
- Service comes with all necessary softwares
- Soft copy training(Videos and eBooks) materials will be available
- Qualified and experienced facilitators
- Get a full Video/Audio recording of the training (No need for refresher class)
- Full certification course (Good for your CV)
- Job/Internship placement support (Optional)
- Customized soft copy of training materials will be provided
- Organized and efficient training process
- Tea/Coffee Breaks and Snacks to be provided
- Conducive air conditioned learning environment and Parking Space
DONT Miss this opportunity!
DATE: (Call in for current dates)
COST: N50,000 pay before 17th May
ORIGINAL COST: 70,000- Pay on training day
Hackers are here, where are you?
ONLY 3 SLOTS LEFT
Account Details
DIAMOND BANK
SOUTECH VENTURES
0054227379
*Please remember to notify us after successful payment or sending a payment notification directly to this email address: [email protected], 08034121380 ,Venue: SOUTECH VENTURES, Shehu Shagari Mosque, Area 1, Abuja.