This course on certified ethical hacker will explore the existence and the use of hacking tools and security systems in any network environment. Within each domain, you will be presented with several tools that a hacker can use, and which countermeasures are most effective against their use.
Some of these include: 1. Ethics and legal issues 2. Footprinting techniques 3. Scanning 4. Enumeration 5. System hacking 6. Trojans and backdoors 7. Sniffers 8. Denial of service 9. Social engineering 10. Session hijacking 11. CEH hacking web servers 12. Web application vulnerabilities 13. Web based password cracking 14. SQL injection 15. Hacking wireless networks 16. Virus and worms 17. Hacking novell 18. Hacking linux 19. IDS, Firewalls and honeypots 20. Buffer overflows 21. Cryptography 22. Penetration testing methodologies You will begin to understand how perimeter defenses work, and then you will move on to scanning and attacking your own networks. You will also learn about escalated privileges, intrusion detection, DDOS attacks, buffer overflows, and virus creation. For more information, you can visit our website at : http://www.ilmuhacker.com Best regards, ilmuhacker.com --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Algorithm Geeks" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [EMAIL PROTECTED] For more options, visit this group at http://groups.google.com/group/algogeeks -~----------~----~----~----~------~----~------~--~---
