Network Security
Image The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and / or computer systems using the same methods as a hacker.

Illegal hacking (i.e.; cracking computer systems) is a felony in the United States and most other countries. But when this type of hacking is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.

An Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

About this workshop

This workshop will demonstrate to participants how to scan, test, hack and secure their own systems in an interactive environment. The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems.

Participants will begin by understanding how perimeter defenses work and how trojans, virus and other malware behave and then they are taught how to scan and attack networks and applications.

They will then learn how intruders use SQL injection, escalate privileges and what steps can be taken to secure a system. They will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Penetration Testing.

This 40 hour highly interactive workshop will help participants have hands on understanding and experience in Ethical Hacking & Countermeasures.


A proper understanding of ethical hacking is an important requirement to assess the integrity of the IT infrastructure.

Expertise in penetration testing & vulnerability assessment is an absolute requirement for a career in information security management and could be followed by management level certifications like CISA, CISSP, CISM, CRISC and ISO 27001.

There are many reasons to learn ethical hacking:

  • Prepare yourself to handle information security with more clarity
  • Expand your present knowledge of identifying threats and vulnerabilities
  • Understand how to provide countermeasures
  • Bring security expertise to your current occupation
  • Become more marketable in a highly competitive environment

Therefore this workshop will prepare you to take the first step into the world of information security and give you a better understanding of various security concepts and practices that will be of valuable use to you and your organization.

Who should attend

This workshop will significantly benefit anyone who is concerned about the integrity of the network / IT infrastructure.

  • IS / IT Specialist / Analyst / Manager
  • IS / IT Auditor / Consultant
  • IT Operations Manager
  • Security Specialist / Analyst
  • Security Manager / Architect
  • Security Consultant / Professional
  • Security Officer / Engineer
  • Security Administrator
  • Security Auditor
  • Network Specialist / Analyst
  • Network Manager / Architect
  • Network Consultant / Professional
  • Network Administrator
  • Technical Support Engineer
  • Senior Systems Engineer
  • Systems Analyst
  • Systems Administrator

Anyone aspiring for a career in Ethical Hacking would benefit from this workshop. The workshop is restricted to participants who have adequate knowledge of networking and TCP/IP concepts.

Workshop Outline

The entire workshop is a combination of theory and hands-on sessions conducted in a dedicated ethical hacking lab environment.

    • Introduction to Ethical Hacking
    • Footprinting and Reconnaissance
    • Scanning Networks
    • Enumeration
    • System Hacking
    • Trojans and Backdoors
    • Viruses and Worms
    • Sniffers
    • Social Engineering
    • Denial of Service
    • Session Hijacking
    • Hijacking Webservers
    • Hacking Web Applications
    • SQL Injection
    • Hacking Wireless Networks
    • Evading IDS, Firewalls and Honeypots
    • Buffer Overflow
    • Cryptography
    • Penetration Testing
Customer Feedback