• Select the relevant price button
  • Click „Add to Cart“
  • In the top right corner you will see the cart with your selected courses.
  • Click on the Cart to enroll and to select payment method.

Regular price: 800 BGN

No courses scheduled at the moment.
You can send us an email and we will notify you once we have group organized.

Duration 6 weekends from 10:00 to 14:00

Maximum trainees: 10

Course overview

Introduction To Ethical Hacking – Information Security Overview. Information Security Threats and Attack Vectors. Hacking Concepts, Types, and Phases. Ethical Hacking Concepts and Scope

Footprinting And Reconnaissance – Concepts. Methodology. Tools. Countermeasures

*** Linux System Administration – Basics – Introduction to Linux. User and Group Accounts. Partitions and Filesystem. Manage Files. Permissions and Ownership. Printing Files. Managing Packages. Kernel Services. Bash Shell and Shell Scripts. Jobs and Processes. System Services.Network Services. Configuring Basic Internet Services. Linux Security.

Scanning Networks – Overview of Network Scanning. Scanning Methodology.

Enumeration – Enumeration Concepts. Enumeration Concepts and Types: NetBIOS, SNMP, LDAP, NTP, SMTP. Enumeration Countermeasures

System Hacking – Information at Hand Before System Hacking Stage. System Hacking: Goals. Hacking Methodology. System Hacking Steps. Hiding Files Covering Tracks

Malware Threats – Introduction to Malware. Trojan Concepts. Types of Trojans. Virus and Worms Concepts. Malware Reverse Engineering. Malware Detection. Countermeasures. Anti-Malware Software

Sniffing – Sniffing Concepts. MAC Attacks. DHCP Attacks. ARP Poisoning. Spoofing Attack. DNS Poisoning. Sniffing Tools. Countermeasures. Sniffing Detection Techniques

Social EngineeringSocial Engineering Concepts. Social Engineering Techniques. Impersonation on Social Networking Sites. Identity Theft. Countermeasures.

Denial-Of-ServiceDoS/DDoS Concepts. DoS/DDoS Attack Techniques. Botnets. DoS/DDoS Attack Tools. Countermeasures

Session HijackingSession Hijacking Concepts. Application Level Session Hijacking. Network-level Session Hijacking. Session Hijacking Tools. Countermeasures

Hacking WebserversWebserver Concepts. Webserver Attacks. Attack Methodology. Webserver Attack Tools. Countermeasures. Patch Management. Webserver Security Tools

Hacking Web ApplicationsWeb App Concepts. Web App Threats. Web App Hacking Methodology. Web Application Hacking Tools. Countermeasures. Security Tools

*** SQL – Basics

SQL InjectionSQL Injection Concepts. Types of SQL Injection. SQL Injection Methodology. SQL Injection Tools. Evasion Techniques. Countermeasures

Hacking Wireless NetworksWireless Concepts. Wireless Encryption. Wireless Threats. Wireless Hacking Methodology. Wireless Hacking Tools. Bluetooth Hacking. Countermeasures. Wireless Security Tools

Hacking Mobile PlatformsMobile Platform Attack Vectors. Hacking Android OS. Hacking iOS. Mobile Security. Guidelines and Tools

Evading Ids, Firewalls, And HoneypotsIDS, Firewall and Honeypot Concepts. IDS, Firewall and Honeypot System. Evading IDS. Evading Firewalls. IDS/Firewall Evading Tools. Detecting Honeypots. Countermeasures

Cloud ComputingIntroduction to Cloud Computing. Cloud Computing Threats. Cloud Computing Attacks. Cloud Security. Cloud Security Tools

CryptographyCryptography Concepts. Encryption Algorithms. Cryptography Tools. Public Key Infrastructure(PKI). Email Encryption. Disk Encryption. Cryptography Attacks. Cryptanalysis Tools

***Kali Linux – Offensive security


Note: Exercises marked with *** will be done depending of the level of knowledge of the group.

© Copyright 2019 MG Academy LTD