We are one of the largest free online selling communities with thousands of active sellers.
249709949 views
Do you have something to sell? Your next sale might be just a few clicks away.
4.7 stars
Based from 899 member feedbacks. We value your suggestions and use it.
Copyright 2021 MYBENTA. All Rights Reserved. Use of this Web site constitutes acceptance of the terms of service and privacy policy. Designated trademarks and brands are the property of their respective owners.
100% Filipino-owned. Free Forever.
PROFESSIONAL COUNTER-HACKING TRAINING
Regular Training Fee: 39,995 / pax +VAT
SATURDAY PROMO FEE: Php15,995 / pax +VAT
GROUP DISCOUNT: Enroll of 10 pax and Get 3 FREE SEATS
Duration: 5 Days
Schedule: June 13 – July 11, 2015; (every Saturday)
Time: 9am – 5pm
Fee Includes: Digital Copy of Training Materials, Certificate, and Snacks and Lunch
Training Venue: GlobalKnowledge G/F Unit 107 Beacon Plaza, Shaw Blvd. Cor. Ideal St. Mandaluyong City
A comprehensive course designed to introduce students to the tools, approach and modus operandi of the digital underground. Throughout the course, students will be exposed to concepts and skills that will empower them to anticipate and respond effectively to intrusions. Students will benefit from extensive hands-on exercises and lab work where they will be confronted with typical hacking scenarios. This class is intended to educate workers about security problems before they happen, and is ideal for anyone who works with computers in a medium-to-large organization.
Objectives:
Highlighting information leakage that can take place even within a seemingly secure environment, the course provides valuable insight into how hackers circumvent and defeat security controls in networked environments, applications and operating systems.
Prerequisites: No prerequisite
Course Topics:
1: Introductions, Ethics & Legal Issues
2: Understanding Virus and Worms
3. Discovering the Network
4: Network Mapping & Scanning
5: Host Mapping (Enumeration)
6: System Hacking
7: Buffer Overflows
8: Gaining Access: Trojans and Backdoors
9: Network Sniffers
10: Denial of Service Attacks
11: Social Engineering Threat
12: Man-in-the-middle Attacks
13: Attacking Web Servers
14: Attacking Web Applications
15: Uncovering Web Vulnerabilities
16: Web Based Password Cracking Methods
17: Cryptography Basics
18: SQL Injection
19: Counter-Attacks: IDS, Firewalls and Honeypots
For more details, please call 721-0006 / 0906-829-1415
Email: [email protected]
This seller has been a member since: May. 27, 2015
Member Location:
Total Classifieds: 20
Why seller feedback is important?
Transact with most credible & reputable sellers
Know the seller you are going to deal with
Claim warranty long after purchasing the item
Warn you and other buyers against scams
Motivates sellers to provide good service