Comentarios sobre Seminario de Ethical Hacking & Countermeasures - Presencial - Miguel Hidalgo - CDMX - Ciudad de México
-
Objetivos del curso
This class will immerse the student into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, Open Source Intelligence, Incident Handling and Log Interpretation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in internet security.
-
Curso dirigido a
This class is a must for networking professionals, IT managers and decision-makers that need to understand the security solutions that exist today. Companies and organizations interested in developing greater e-commerce capability need people that know information security. This class provides a solid foundation in the security technologies that will pave the way for organizations that are truly interested in reaping the benefits and tapping into the potential of the Internet.
-
Titulación
The Certified Ethical Hacker certification exam 312-50 will be conducted on the last day of training. Students need to pass the online Prometric exam to receive CEH certification.
-
Contenido
Por el momento este curso no se está impartiendo
Course Content:
- Ethics and Legality
- Footprinting
- Scanning
- Enumeration
- System Hacking
- Trojans and Backdoors
- Sniffers
- Denial of Service
- Social Engineering
- Session Hijacking
- Hacking Web Servers
- Web Application Vulnerabilities
- Web Based Password Cracking Techniques
- SQL Injection
- Hacking Wireless Networks
- Virus and Worms
- Physical Security
- Linux Hacking
- Evading Firewalls, IDS and Honeypots
- Buffer Overflows
- Cryptography
- Penetration Testing