• Online, Instructor-Led
  • Online, Self-Paced
Course Description

This course provides hands-on training to help students master the same techniques that hackers use to penetrate network systems, and leverage them ethically to protect their own infrastructure.

Learning Objectives

Students will be able to grasp the step-by-step methodology and tactics that hackers use to penetrate network systems, understand the finer nuances of trojans, backdoors and countermeasures, get a better understanding of IDS, firewalls, honeypots and wireless hacking, master advanced hacking concepts, including mobile device and smart phone hacking, writing virus codes, exploit writing & reverse engineering and corporate espionage, gain expertise on advanced concepts such as advanced network packet analysis, securing IIS & Apache web servers, Windows system administration using PowerShell, and hacking SQL and Oracle database, cover the latest developments in mobile and web technologies including Android, iOS, BlackBerry, Windows Phone and HTML 5, and learn advanced log management for information assurance and allow you to manage information security with more clarity.

Framework Connections