Ethical Hacking

@ Actiive Tech Networks

+94 11 4 848481, +94 75 3333975

8 Days

LKR 38,500

Ethical hacking training goes in-depth into the techniques used by malicious, black hat hackers with attention getting lectures and hands-on lab exercises. You leave with the ability to quantitatively assess and measure threats to information assets; and discover where your organization is most vulnerable to hacking in this network security training course. The difference of this course is, it will teach you the defensive and offensive methods in security a given information infrastructure. Apart from the technical aspects we will cover the management skills needed to work as a consultant in the industry.

This ethical security training course has a significant return on investment; you walk out the door with hacking skills that are highly in demand. The course is ideal for network administrators, security officers & crime prevention / protection officers and is designed to educate for the purpose of properly defending systems from hacking attacks.

Cyber forensic investigation is the process of detecting hacking attacks and properly extracting evidence to report the crime and conduct audits to prevent future attacks. Computer forensics is simply the application of computer investigation and analysis techniques in the interests of determining potential legal evidence. Evidence might be sought in a wide range of computer crime or misuse, including but not limited to theft of trade secrets, theft of or destruction of intellectual property, and fraud. Cyber Forensics investigators can draw on an array of methods for discovering data that resides in a computer system, or recovering deleted, encrypted, or damaged file information.

Who should attend;

System professionals who looking for a security qualification. Security professionals who need to upgrade skills and knowledge.

Course Contents

  • Introduction to ethical hacking
  • Foot printing and reconnaissance
  • Scanning networks
  • Google Hacking
  • Windows hacking
  • Trojans and Backdoors
  • Sniffing
  • System hacking
  • Malware threats
  • Social engineering
  • Virus and worms
  • Proxy server and packet filtering
  • Wireless hacking
  • Hacking web servers
  • Session hijacking
  • Hacking web applications
  • SQL injection
  • Hacking mobile platforms
  • Cloud computing
  • Cryptography

No 31 1/2 , 42nd Lane , Colombo 06

Send Inquiry

Scholarship Alerts!

Type "REG coursenet" and SEND to 77000

Get latest scholarships, offers & academic event alerts to your phone via SMS.

Service is only available for Dialog, Hutch & Airtel users at the moment. Monthly (Rs. 30 + tax).

Related Courses