PROGRAM DESCRIPTION
Technology is evolving and the Internet is a place where all types of situations might occur. The Ethical Hacking program is designed to provide students that are interested in information technology, the right guidance in protecting networks while also testing the networks by ethically gaining access to an organization’s personal information via ethical hacking in order to assess the levels of security needed to protect that information. This program may assist students in learning how to target vulnerabilities and discrepancies in networks while implementing the very hacking skills a hacker may use, to promote a safer and stronger system. The Ethical Hacking is an online program offered by the Americation Career and Training School.
At completion of the program the student will be awarded with a certificate of completion
PROGRAM MODULES OUTLINE
PROGRAM OUTLINE OF ETHICAL HACKING
– Fundamentals of Ethical Hacking.
– Key Concepts of Footprinting, IP Address & More.
– Introduction to Scanning, its Types and Methods.
– Fundamentals of Enumeration; Types and Process.
– Introduction to Hacking the Systems; Password Cracking.
– Fundamentals of Penetration Testing; Tools and Types of Phases.
– Key Principles of Formulating Trojans, Types and Risks to Security.
– Introduction to Worms and Viruses; Types and Techniques.
– Introduction to Sniffing; Types and Protocols Vulnerable
– Fundamentals of Social Engineering; Types and Defending Social Engineering Threats.
– Introduction to Phishing Attacks; Methods and Types.
– Introduction to Denial of Service; Consequences of Attacks and its Types.
– Fundamentals of Excessive Buffering.
– Introduction to Session Hijacking.
– Introduction to Hacking Web Servers; Vulnerabilities, Browser and Password Hacking, Scanners & More.
– Introduction to Hacking Wireless Networks; Types of Wireless Networks and Tools.
– Introduction to Physically Securing Unauthorized Access; Physical, Technical and More.
– Introduction to Hacking IDs, Firewalls and Searching HoneyPots.
– Introduction to Hacking Routers, Modems, Linux, Mac OS X, Mobiles & More.
– Fundamentals of Cryptography.
PROGRAM KEY DETAILS
DURATION
2 Months
PROGRAM PACE
Self Paced
START DATES
1st & 15th of Every Month
ACCESS
24/7
REGISTRATION
Online or Oncampus
CLASS SIZE
Under 15
DELIVERY
Online
LANGUAGE
English
PROGRAM ONLINE LEARNING FEATURES
LEARNING PATH
All programs have a learning path that students can follow without getting off track.
TEXT TO SPEECH
If you don't feel like reading the material, you can activate the audio reader in the program.
MODULE BASED
Each program is broken down into modules to simply the contents in a section.
DASHBOARD
You can view the overall program outline from 1 single dashboard without having to switch screens.
ONLINE ATTENDANCE
When you attend the online programs, you will be able to see the duration of time spent.
STUDY TOOLS
Majority programs is equipped with study tools such as flash cards, crosswords etc.
PROGRESS TRACKER
Now you have the ease of tracking your progress while you are in the program.
ORIENTATION
All programs come with an orientation towards your program to assist you.
PROGRAM LEARNING OBJECTIVES & KEY TERMS
-
Discuss the types of phishing attacks and signs that indicate phishing.
-
Apply anti-phishing techniques to overcome phishing attacks.
-
Describe a denial of service attack, its types and affects.
-
Define equipment used to avoid denial of service attacks.
-
Identify bots and their functions.
-
Describe overflowing buffers, their types and impact of buffer overflows.
-
Identify the origins of buffer overflow.
-
Discuss how avoid buffer overflows can be avoided.
-
Discover reasons of session hijacking.
-
Compare and contrast spoofing and hijacking.
-
Define types of session hijacking.
-
Discuss the procedure of performing a session hijacking.
-
Discuss strategies to control session hijacking.
-
Define Web Servers, types and its vulnerabilities.
-
Describe the kind of attacks web servers face.
-
Describe the meaning of patch management.
-
Describe the mechanisms of Web Application and its hacking.
-
Discuss the procedures of web application attacks.
-
Describe the meaning and techniques of authentication.
-
Define the steps of password hacking, its types and types of resources used to hack passwords.
-
Describe the procedures to overcome password hacking.
-
Define Web browsers and their mechanism.
-
Define types of web browsers.
-
Describe types of security and privacy.
-
List the hacking database servers and different techniques to hack into an Oracle webserver.
-
Define an Oracle worm.
-
Describe the meaning and ways to conduct SQL injections.
-
Identify different kinds of wireless networks.
-
Analyze the pros and cons of a wireless network.
-
List types of wireless devices.
-
Describe evading IDs and Firewalls.
-
Describe a router and its various types.
-
Demonstrate hacking conducted in Mac OS X and the potential threats that can be combatted.
-
Describe cryptography and its type.
-
Understand the significance of SSL and SSH.
-
Learn how to break encryptions using certain resources.
PROGRAM COMPLETION REWARDS
1
DIGITAL BADGE
At successful completion, you will receive digital badges that can be used online to display your achievements.
2
CERTIFICATE
At the completion of the program, you will be awarded with a program completion certificate.
3
CAREER HOURS
With the completion of this program, you will also be awarded with Career Enhancement Clock Hours (CECH), that may be displayed on your resume.
4
TRANSCRIPT
Your completion also comes with a dedicated transcript that shows your areas of grades for each course you attended.