Ethical Hacker Expert - Training Package (with CHFI & CEH)

e-Careers Limited
Online

£ 250 - (294 )
IVA inc.

Información importante

  • Vocational qualification
  • Online
  • Cuándo:
    A elegir
Descripción

Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems and how they can be stopped with this Cyber Security Forensic Investigator and Ethical Hacker Package.

Información importante
¿Qué objetivos tiene esta formación?

Once students have completed this course they will be ready to sit their CHFI EC0 312-49 & 312-50 exams. You will have the knowledge to function in roles such as ethical hacker, cyber security, penetration tester and information security analyst.

¿Esta formación es para mí?

This course is best suited to anyone who is looking to gain the necessary knowledge to make a career change in IT security. Or, it is equally able to satisfy the demands of anyone who is looking to better understand hacking techniques so that can protect their, or their clients, resources.

Requisitos: There are no pre-requisites for this course.

Instalaciones y fechas

Dónde se imparte y en qué fechas

Inicio Ubicación
A elegir
Online

¿Qué aprendes en este curso?

Access
Network
Hacker
systems
Network Training

Temario

The package is split into two courses. The first of these courses is built around the Certified Ethical Hacker certification: • Understanding ethics involved in white hat hacking. • How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked. • How to identify potential vulnerabilities. • Enumeration • Trojans, backdoors, viruses, worms and Denial of Service (DoS) attacks. • The role of social engineering to steal confidential information directly from employees. • Sniffers and session hijacking • Web-based attacks • Wireless network security • How hackers avoid protective measures like IDS, firewalls and honeypots. • Network forensic techniques • Cryptography and steganography • How to use the metasploit toolkit to assess network protection measures. The second stage of this package is the Computer Hacking Forensic Investigator course and takes students through: • How to carry out an investigation according to industry best practice principles and legal guidelines. • Searching and seizing resources required for the investigation. • Handling Digital Evidence • First Responder Procedures • How to fit a forensic lab for investigations. • Hard Disks and File Systems • Windows Forensics • Data Acquisition and Duplication • Recovering Deleted Files and Partitions • Using Access Data FTK and Special Steps • EnCase • Stenography • Passwords • Log Correlation • Network Forensics • Wireless Attacks • Web Attacks • Email Crimes • Mobile Resource Investigation • Investigation Reports • Expert Witness

Información adicional

Flexible, interest-free, part payment options available.