+852 2882 8733    ftmsaf@ftmsaf.com.hk     

FTMS Ethical Hacking

FTMS Ethical Hacking

Course introduction

FTMS comprehensive Ethical Hacking and Information Systems Security Auditing Program focusing on the latest security threats, advanced attack vectors and practical real-time demonstration of latest methodologies, Hacking techniques, tools, tricks and security measures.  We can have the newly gained knowledge of exploring, testing, hacking and securing our own systems. 

Learning Outcome

FTMS Ethical Hacking is one of the most Advanced Ethical Hacking Course which delivers in-depth knowledge of real-time attack vectors and defensive methods. This course has been designed by the group of globally recognized Information Security Professionals to meet the participant and organization expectations. For easy understanding for the participants, LIVE practical demonstration has been added for all necessary topics.

Lecturer Background

All our Trainers are senior professional with tremendous exposure to Information Security and Governance Risk & Compliance. With over a decade of experience in training & consulting, they help bring a lot of practical and industry relevant examples with case studies to the classroom which improves the overall learning experience. Our professional hold industry acclaimed accreditation such as : CISSP, CHFI, CISA, CISM, CEH, ISO 27001 LI / LA, CCSP, CWNA, MCSE ,CCSP, ISO 22301 LA,ISO 20000 LA.

Program Outline

4 days Agenda

Introduction to Ethical Hacking

Footprinting (Reconnaissance-Passive)

  • Types of Footprinting
  • Footprinting Tools and countermeasures

Enumeration (Reconnaissance - Active)

  • Enumeration Techniques
  • Enumeration Countermeasures

Network Scanning

  • Network Scanning Technique
  • Network Scanning Countermeasures

System Hacking Methodology

  • System Hacking Methodology
  • Steganography
  • Steganalysis Attacks
  • Covering Tracks6Malware Threats
  • Types of Trojans
  • Trojan Analysis
  • Trojan countermeasures

Virus and Worms

  • Working Of Viruses
  • Virus Analysis
  • Computer Worms
  • Malware
  • Analysis Procedure and Countermeasures

Sniffing

  • Packet Sniffing Techniques
  • How to defend against sniffing?

Denial of Service

  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Attack Tools
  • DoS/DDoS Countermeasures

Session Hijacking Techniques

  • Session Hijacking Techniques
  • Session Hijacking Countermeasures

Servers Attacks - Web Server, File Server

  • Different Types of Webserver Attacks
  • Social Engineering Attacks
  • Vulnerability Assessment

Ethical Hacking As a Career in detailed discussion on Information Security Industry growth and its present career opportunities

Who should attend

  • Security officer
  • Auditors
  • security professionals
  • Systems Administrators
  • Network Administrators
  • Wireless Administrators
  • Webhosting Server Administrators
  • Web Developers and Designers
  • Research Analysts
  • IT professionals
  • Banking Professionals
  • Students
  • Anyone who is concerned about the integrity of the network infrastructure
  • Anyone who is seeking a break through Career into information security

Leaflet

Enquiry

Contact us

Your message has been sent sucessfully

FTMS Training Systems (HK) Limited

Address: 6th Floor, Lee Garden Five, 18 Hysan
Avenue, Causeway Bay, Hong Kong.
Email: ftmsaf@ftmsaf.com.hk
Phone: 852 2882 8733

Stay Connected