Ethical Hacking and Cyber Security

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

Course Outline

01. Introduction to Ethical Hacking

02. Footprinting and Reconnaissance

03. Scanning Networks

04. Enumeration

05. System Hacking

06. Malware Threats

07. Sniffing

08. Social Engineering

09. Denial-of-Service

10. Session Hijacking

11. Hacking Web Servers

12. Hacking Web Applications

13. SQL Injection

14. Hacking Wireless Networks

15. Hacking Mobile Platforms

16. Evading IDS, Firewalls, and Honeypots

17. Cloud Computing

18. Cryptography

Used Tools

N/A