Ethical Hacking & Cyber-Warfare Diploma

27th – August 2020
0
0
0
Weeks
0
0
0
0
Days
0
0
Hrs
0
0
Min
0
0
Sec

Agenda

  • Duration: 15-Days
  • Time: 06:30 PM : 9:30 PM
  • Diploma
  • Location: Virtual Online Training

Promotion

30% Discount

Enjoy 30% Discount from Original Price.

Audience

This course is aimed at all levels of IT, Computer Science, Computer Engineering, and those who want to start their career in the Cybersecurity Field.

Why Ethical Hacking & Cyber-Warfare Diploma?

Start your Cybersecurity Career or give it a boost with our partially funded scholarship. Join our 15-Days workshop and gain real hands-on experience form our expert engineers who hold years of experience in the field of Cybersecurity. This Workshop will prepare you to become a bug bounty hunter, CTF expert, Penetration tester, and make you ready for your future cybersecurity job.

Who’s it for?

This course is aimed at all levels of IT, CS, Computer Eng., and those who wants to start a career in Cybersecurity.

Part 1: IT Fundamentals (Free 3-Sessions)

  • What are a network and network components
  • Network Types
  • Network Models
  • Network Communication (OSI/TCP Model)
  • Networking Protocols
  • Network Topology
  • IP Address Classification
  • CAM table vs ARP table
  • Network Messages Types
  • Introduction to Databases
  • Introduction to SQL
  • Introduction to Active directory And Domain Controllers
  • Authentication in Windows
  • Protocols
  • Strings
  • Math
  • Variables
  • Functions
  • Boolean Expressions
  • Relational Operators
  • Conditional Statements
  • Loops
  • Lists
  • Installing VMWare / Kali Linux
  • Kali Linux Overview
  • Navigating the File System
  • Users and Privileges
  • Common Network Commands
  • Viewing, Creating, and Editing Files
  • Starting and Stopping Services
  • Installing and Updating Tools

Part 2: The Ethical Hacking & Cyber-Warfare Workshop (12-Sessions)

  • Cybersecurity vs. Information Security
  • Physical Security
  • Information Security Threats and Attack Vectors
  • Hacking Terminology
  • Ethical Hacking Concepts
  • Incident Management Process
  • Penetration Testing vs. Vulnerability Assessment
  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Countermeasures
  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Banner Grabbing
  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports
  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Ransomware Concepts
  • Malware Analysis
  • Countermeasures
  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Countermeasures
  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Identity Theft
  • Countermeasures
  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • Countermeasures
  • Session Hijacking Concepts
  • Session Hijacking Techniques
  • Countermeasures
  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Countermeasures
  • Web App Concepts
  • Web App Attacks
  • Hacking Methodology
  • Countermeasures
  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures
  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Countermeasures
  • Wireless Security Tools
  • IoT Concepts
  • IoT Attacks
  • Countermeasures
  • Cloud Computing Concepts
  • Cloud Computing Attacks
  • Cloud Security
  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis

Hoda Medhat, BSc. Cybersecurity Engineer

Hoda has done her graduation in the Information Security field followed by 5 years of experience in the IT / Cybersecurity fields, spending most of her career in Information Security Implementation and Training.

Hoda is an international certified trainer from EC-Council and CompTIA who is delivered a lot of official training courses and workshops. She maintains an exceptional track record of excellent feedback throughout her course delivery.

Hoda has hands-on experience on Penetration testing, vulnerability, and risk assessment, intrusion detection & prevention, forensic & data recovery, deploying Firewall Policies, Application security testing as well as vulnerability analysis.

Virtual Online Live Training

Event Registration Form

Thank you for your interest in attending our specialized Ethical Hacking & Cyber-Warfare workshop with Cyber Force. Please complete the required information below, and an account manager will contact you shortly.

    Get in touch

    Cairo, Egypt

    • Building 27 – El Moltaqa El Araby District, Sheraton, Autostrade, Cairo, Egypt
    • Tel: +2 0155555 4989