Author Topic: Ethical Hacking  (Read 677 times)


  • Guest
Ethical Hacking
« on: February 09, 2012, 02:50:04 PM »
The Best Defense is a Good Offense:
The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This ethical security training course has a significant Return on Investment, you walk out the door with hacking skills that are highly in demand, as well as the Certified Ethical Hacker certification!

Run hacking attacks in our classroom labs, be a hacker for a week:

Some of the hacking concepts you will learn to master during this hands on hacking course...

    Security testing methodologies including the OSSTMM
    Stealthy network recon
    Multi-OS banner grabbing
    Remote root vulnerability exploitation
    Privilege escalation hacking
    Unauthorized data extraction
    Remote access trojan hacking
    Offensive sniffing
    Wireless insecurity
    Breaking IP-based ACLs via spoofing


    Evidence removal and anti-forensics
    Attacking network infrastructure devices
    Hacking by brute forcing remotely
    Hacking Web Applications
    Breaking into databases with SQL Injection
    Cross Site Scripting hacking
    Justifying a penetration test to management and customers
    CEH review
    Defensive techniques

Some of the instructor-led hands-on hacking lab exercises in this security training experience.


    Capture the Flag hacking exercises every night !
    Abusing DNS for host identification
    Leaking system information from Unix and Windows
    Stealthy Recon
    Unix, Windows and Cisco password cracking
    Remote buffer overflow exploit lab I - Smashing the Stack
    Remote buffer overflow exploit lab II - Getting Tricky
    Remote heap overflow exploit lab III - Beyond the Stack


    Desktop exploitation
    Remote keylogging
    Data mining authentication information from clear-text protocols
    Remote sniffing
    Breaking wireless security via hacking
    Malicious event log editing
    Transferring files through firewalls
    Hacking into Cisco routers
    Harvesting web application data
    Data retrieval with SQL Injection Hacking
    Calculating the Return on Investment (ROI) for an ethical hack