top of page
was850.png
NEIH WHITE THIN LETTER LOGO 8.png

Ethical Hacking and Network Defense Program

WELCOME TO THE PROGRAM PAGE OFFERED BY AMERICATION CAREER AND TRAINING SCHOOL.

PROGRAM DESCRIPTION

Technology is evolving and the Internet is a place where all types of situations might occur. The Ethical Hacking program is designed to provide students that are interested in information technology, the right guidance in protecting networks while also testing the networks by ethically gaining access to an organization’s personal information via ethical hacking in order to assess the levels of security needed to protect that information. This program may assist students in learning how to target vulnerabilities and discrepancies in networks while implementing the very hacking skills a hacker may use, to promote a safer and stronger system. The Ethical Hacking is an online program offered by the Americation Career and Training School.

 

At completion of the program the student will be awarded with a certificate of completion

DESCRIPTION

PROGRAM MODULES OUTLINE

PROGRAM OUTLINE OF ETHICAL HACKING

– Fundamentals of Ethical Hacking.
– Key Concepts of Footprinting, IP Address & More.
– Introduction to Scanning, its Types and Methods.
– Fundamentals of Enumeration; Types and Process.
– Introduction to Hacking the Systems; Password Cracking.
– Fundamentals of Penetration Testing; Tools and Types of Phases.
– Key Principles of Formulating Trojans, Types and Risks to Security.
– Introduction to Worms and Viruses; Types and Techniques.
– Introduction to Sniffing; Types and Protocols Vulnerable
– Fundamentals of Social Engineering; Types and Defending Social Engineering Threats.
– Introduction to Phishing Attacks; Methods and Types.
– Introduction to Denial of Service; Consequences of Attacks and its Types.
– Fundamentals of Excessive Buffering.
– Introduction to Session Hijacking.
– Introduction to Hacking Web Servers; Vulnerabilities, Browser and Password Hacking, Scanners & More.
– Introduction to Hacking Wireless Networks; Types of Wireless Networks and Tools.
– Introduction to Physically Securing Unauthorized Access; Physical, Technical and More.
– Introduction to Hacking IDs, Firewalls and Searching HoneyPots.
– Introduction to Hacking Routers, Modems, Linux, Mac OS X, Mobiles & More.
– Fundamentals of Cryptography.

OUTLINE

PROGRAM KEY DETAILS

DURATION

2 Months

PROGRAM PACE

Self Paced

START DATES

1st & 15th of Every Month

ACCESS

24/7

REGISTRATION

Online or Oncampus

CLASS SIZE

Under 15

DELIVERY

Online

LANGUAGE

English

KEY
NEIH BLACK LOGO 9.png
  • Self-Discipline your self

  • Schedule the time required for study

  • Be focussed once you enroll.

PROGRAM ONLINE LEARNING FEATURES

LEARNING PATH

All programs have a learning path that students can follow without getting off track.

TEXT TO SPEECH

If you don't feel like reading the material, you can activate the audio reader in the program.

MODULE BASED

Each program is broken down into modules to simply the contents in a section.

DASHBOARD

You can view the overall program outline from 1 single dashboard without having to switch screens.

ONLINE ATTENDANCE

When you attend the online programs, you will be able to see the duration of time spent.

STUDY TOOLS

Majority programs is equipped with study tools such as flash cards, crosswords etc.

PROGRESS TRACKER

Now you have the ease of tracking your progress while you are in the program.

ORIENTATION

All programs come with an orientation towards your program to assist you.

FEATURES

PROGRAM LEARNING OBJECTIVES & KEY TERMS

  • Understand the significance of securing information.

  • Discuss types of securities.

  • Define the cycle of hacking, types of hacking and hacktivism.

  • Analyze types of ethical hacking.

  • Identify the procedure for ethical hacking.

  • Describe Footprinting used in the reconnaissance phase.

  • Discover information that is available to all of the public from a company’s own website.

  • Construct a WHOIS query.

  • Describe scanning and its type.

  • Identify the steps required in methods of scanning.

  • Identify banner grabbing.

  • Describe enumeration, its methodology and use.

  • Analyze null sessions.

  • Demonstrate how to hack passwords.

  • Utilize password hacking resources.

  • Define escalating privileges.

  • Use Penetration Testing; Tools and Software.

  • Define Attack Phases.

  • Measure risk management.

  • Describe Trojans and backdoors; Types and Uses.

  • Compare and contrast between covert and overt channels of network.

  • Build a Trojan horse utilizing construction kit.

  • Define different anti-Trojans.

  • Describe viruses, history and familiar dangerous viruses.

  • Compare and contrast viruses and worms.

  • Define the after-effects of a virus.

  • Identify life cycle of viruses.

  • Utilize different methods to avoid viruses.

  • Explain the meaning of sniffers.

  • Define protocols susceptible to sniffing.

  • Define various ways a sniffer can attack.

  • Explain DNS poisoning.

  • Explain the meaning of social engineering and list its types.

  • Differentiate different types of threats and combats to social engineering.

  • Suggest solutions and combatting techniques against social engineering.

  • Describe and identify types of identity theft and how to combat identity theft.

  • Describe phishing, reasons for its operations and its methods.

  • Discuss the types of phishing attacks and signs that indicate phishing.

  • Apply anti-phishing techniques to overcome phishing attacks.

  • Describe a denial of service attack, its types and affects.

  • Define equipment used to avoid denial of service attacks.

  • Identify bots and their functions.

  • Describe overflowing buffers, their types and impact of buffer overflows.

  • Identify the origins of buffer overflow.

  • Discuss how avoid buffer overflows can be avoided.

  • Discover reasons of session hijacking.

  • Compare and contrast spoofing and hijacking.

  • Define types of session hijacking.

  • Discuss the procedure of performing a session hijacking.

  • Discuss strategies to control session hijacking.

  • Define Web Servers, types and its vulnerabilities.

  • Describe the kind of attacks web servers face.

  • Describe the meaning of patch management.

  • Describe the mechanisms of Web Application and its hacking.

  • Discuss the procedures of web application attacks.

  • Describe the meaning and techniques of authentication.

  • Define the steps of password hacking, its types and types of resources used to hack passwords.

  • Describe the procedures to overcome password hacking.

  • Define Web browsers and their mechanism.

  • Define types of web browsers.

  • Describe types of security and privacy.

  • List the hacking database servers and different techniques to hack into an Oracle webserver.

  • Define an Oracle worm.

  • Describe the meaning and ways to conduct SQL injections.

  • Identify different kinds of wireless networks.

  • Analyze the pros and cons of a wireless network.

  • List types of wireless devices.

  • Describe evading IDs and Firewalls.

  • Describe a router and its various types.

  • Demonstrate hacking conducted in Mac OS X and the potential threats that can be combatted.

  • Describe cryptography and its type.

  • Understand the significance of SSL and SSH.

  • Learn how to break encryptions using certain resources.

OBJECTIVES

PROGRAM COMPLETION REWARDS

1 ICON DIGITAL BADGE.png

1

 

DIGITAL BADGE

At successful completion, you will receive digital badges that can be used online to display your achievements.

3 ICON CERTIFICATE.png

2

 

CERTIFICATE

At the completion of the program, you will be awarded with a program completion certificate.

2 ICON CLOCK HOURS.png

3

 

CAREER HOURS

With the completion of this program, you will also be awarded with Career Enhancement Clock Hours (CECH), that may be displayed on your resume. 

4 ICON TRANSCRIPT.png

4

 

TRANSCRIPT

Your completion also comes with a dedicated transcript that shows your areas of grades for each course you attended.

COMPLETION
TUITION FEES

PROGRAM TUITION & FEES PAYMENT PLANS

Slide1.png
bottom of page