Security Vulnerabilities Assessment (Ethical Hacking) — a 3-day IT Security training course

A unique, authoritative, high-value, hands-on practical course which provides an essential understanding of the tools, methodologies and vulnerabilities that hackers could employ to exploit the IT systems of your organisation.

IT Security Training Courses  The World's ONLY CWNP GOLD Partner
Course duration: 3 days

Course Price: £1495




 


Related courses:

IT Security Courses

IT Security Training Course Roadmaps


Only from:

www.lever.co.uk

Call +44 (0)113 398 3300


Limited places available


Enquire about this IT Security course:

Why this IT Security course?

This Ethical Hacking course is designed to educate IT support staff in order to allow them to defend systems against hacking attacks. During this course, delegates will:

IT Security Training Course Objectives

On completing this course, you will be able to:

Who should attend this IT Security course


With the rapid increase in the numbers of hackers and hacker tools, the increasing complexity of IT systems and networks, and with the continuous announcement of security vulnerabilities in operating systems, applications software, and network infrastructure devices, all IT support professionals must now become knowledgeable in the essentials of network security and vulnerability assessment.

IT Security Course Pre-requisites

Delegates must have a basic understanding of TCP/IP protocols, and a technical background in Microsoft Windows 2000, Microsoft Windows XP or UNIX operating systems.

Lifetime Post-Course Support

After completing this IT Security training course, delegates receive lifetime post-training support from LEVER Technology Group PLC, to help them apply the technologies and skills they have learned with us, to provide career-long support, and to ensure they are better equipped for their future roles in IT and networking.

IT Security Training Course Content

An Introduction to Hacking

Risks to your Business

TCP/IP Essentials

Attack Methodology

Hacker Tools and Techniques

Information Discovery

Target Scanning, System Detection

Vulnerability Assessment

Exploitation and Privilege Escalation

Trojans, Back-Doors and Root Kits

Firewall and IDS Evasion

Hacking Prevention


LEVER Technology Group PLC - Wireless Telecoms training specialists
 
Copyright © 1996-2013 LEVER Technology Group PLC, Woodhead House, Woodhead Road, Leeds, WF17 9TD, UK
Tel: +44 (0) 113 398 3300   Fax: +44 (0) 1924 442829   E-mail:
Important Notices and Privacy Statement   Maintained by http://WWW.LEVER.CO.UK

    network, security, ethical, hacking, training, course, tutorial - Enrol