Security Vulnerabilities Assessment (Ethical Hacking) — a 3-day training course

A unique, authoritative, high-value, hands-on practical course which provides an essential understanding of the tools, methodologies and vulnerabilities that hackers could employ to exploit the IT systems of your organisation.

IT Security Training Courses  The World's ONLY CWNP GOLD Partner
Course duration: 3 days

Course Price: £1495


Related courses:

IT Security Training Course Roadmaps

Only from:

Call +44 (0)113 398 3300

Limited places available

Enquire about this IT Security course:

Why this IT Security course?

This Ethical Hacking course is designed to educate IT support staff in order to allow them to defend systems against hacking attacks. During this course, delegates will:

IT Security Training Course Objectives

On completing this course, you will be able to:

Who should attend this IT Security course

With the rapid increase in the numbers of hackers and hacker tools, the increasing complexity of IT systems and networks, and with the continuous announcement of security vulnerabilities in operating systems, applications software, and network infrastructure devices, all IT support professionals must now become knowledgeable in the essentials of network security and vulnerability assessment.

IT Security Course Pre-requisites

Delegates must have a basic understanding of TCP/IP protocols, and a technical background in Microsoft Windows 2000, Microsoft Windows XP or UNIX operating systems.

Lifetime Post-Course Support

After completing this IT Security training course, delegates receive lifetime post-training support from LEVER Technology Group PLC, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.

IT SecurityTraining Course Content

An Introduction to Hacking

Risks to your Business

TCP/IP Essentials

Attack Methodology

Hacker Tools and Techniques

Information Discovery

Target Scanning, System Detection

Vulnerability Assessment

Exploitation and Privilege Escalation

Trojans, Back-Doors and Root Kits

Firewall and IDS Evasion

Hacking Prevention

LEVER Technology Group PLC - Wireless Telecoms training specialists
Copyright © 1996-2010 LEVER Technology Group PLC, Gelderd Point, Gelderd Road, Leeds, LS27 7JP, UK
Tel: +44 (0) 113 398 3300   Fax: +44 (0) 113 238 1222   E-mail:
Important Notices and Privacy Statement   Maintained by http://WWW.LEVER.CO.UK

    network, security, ethical, hacking, training, course, tutorial - Enrol