Go to the version for visually impaired
Font size
Color scheme
Maximize panel


Course Overview

The rapid and dramatic advances in information technology (IT) in recent years have without question generated tremendous benefits. However, they have also created significant and unprecedented risks to operations. Computer security has, in turn, become much more important as all levels of an organization to utilize information systems security measures to avoid data tampering, fraud, disruptions in critical operations, and inappropriate of sensitive information. After the boom in Networking and Software jobs, the past few years have seen a sharp rise in the field of information security. Information Security and Ethical Hacking is the latest buzzword in the industry. In the past five years, the percentage of hacking crimes, data thefts, data losses, viruses and other cyber crimes have increased exponentially. 

 This course is therefore designed for participants wishing to take lead in their organisation cyber defense against system indruders . Participants will understand the environment where they will be shown how to scan, test, hack and secure their own systems. The intensive environment will give participants in-depth knowledge and practical experience with the current essential security systems.

 Participants will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Participants will learn how intruders escalate privileges and what steps can be taken to secure a system. Participants will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. Participants will have hands on understanding and experience in Ethical Hacking. Participants may proceed to do accredited Certification in Ethical Hacking. 

Course Objectives 

After completion of this course participants should be able to : 

=>Understand modern hacking and defence tricks 

=>Secure both clean and corrupted systems, protecting personal data, securing simple computer networks, and safe Internet usage 

=>Understand key terms and concepts in cyber law, intellectual property and cyber crimes, trademarks and domain theft and extend the target of information security to the wider threat from cybercrime, such as intellectual property protection, fraud, or extortion 

=> Determine computer technologies, digital evidence collection, and evidentiary reporting in forensic acquisition=>Incorporate approaches to secure networks, firewalls, intrusion detection systems, and intrusion prevention systems=>Examine secure software construction practices 

=>Provide evidence gathered to act in the organisation’s defense if subject to a lawsuit 

=> In the event of a major incident,provide a fast and efficient investigation and corresponding actions with minimal disruption to the business 

=>Extend the target of information security to the wider threat from cybercrime, such as intellectual property protection, fraud, or extortion. 

=> Improve and make the interface to law enforcement easier.

 =>Incorporate approaches for incident analysis and response 

=>Incorporate approaches for risk management and best practices 

 Who should attend

 Security Officers, IT Auditors, Security professionals, Site Administrators, and anyone who is concerned about the integrity of the network infrastructure

© Webnet 2018