Quality Seal Emagister EMAGISTER CUM LAUDE

Ethical Hacker Expert - Training Package (with CHFI & CEH)

e-Careers Limited

£ 250 - (296 )

Información importante

  • Vocational qualification
  • Online
  • Cuándo:
    A elegir

Master the science of forensic investigations and combine that mastery with the knowledge of tricks cybercriminals use to access corporate systems and how they can be stopped with this Cyber Security Forensic Investigator and Ethical Hacker Package.

Información importante
¿Qué objetivos tiene esta formación?

Once students have completed this course they will be ready to sit their CHFI EC0 312-49 & 312-50 exams. You will have the knowledge to function in roles such as ethical hacker, cyber security, penetration tester and information security analyst.

¿Esta formación es para mí?

This course is best suited to anyone who is looking to gain the necessary knowledge to make a career change in IT security. Or, it is equally able to satisfy the demands of anyone who is looking to better understand hacking techniques so that can protect their, or their clients, resources.

Requisitos: There are no pre-requisites for this course.

Instalaciones y fechas

Dónde se imparte y en qué fechas

Inicio Ubicación
A elegir

¿Qué aprendes en este curso?

Security Management
Network Training
Network monitoring
Ethical Hacker Expert


The package is split into two courses. The first of these courses is built around the Certified Ethical Hacker certification: • Understanding ethics involved in white hat hacking. • How cybercriminals test network protection measures and how these reconnaissance activities can be spotted and blocked. • How to identify potential vulnerabilities. • Enumeration • Trojans, backdoors, viruses, worms and Denial of Service (DoS) attacks. • The role of social engineering to steal confidential information directly from employees. • Sniffers and session hijacking • Web-based attacks • Wireless network security • How hackers avoid protective measures like IDS, firewalls and honeypots. • Network forensic techniques • Cryptography and steganography • How to use the metasploit toolkit to assess network protection measures. The second stage of this package is the Computer Hacking Forensic Investigator course and takes students through: • How to carry out an investigation according to industry best practice principles and legal guidelines. • Searching and seizing resources required for the investigation. • Handling Digital Evidence • First Responder Procedures • How to fit a forensic lab for investigations. • Hard Disks and File Systems • Windows Forensics • Data Acquisition and Duplication • Recovering Deleted Files and Partitions • Using Access Data FTK and Special Steps • EnCase • Stenography • Passwords • Log Correlation • Network Forensics • Wireless Attacks • Web Attacks • Email Crimes • Mobile Resource Investigation • Investigation Reports • Expert Witness

Información adicional

Flexible, interest-free, part payment options available.