Hacking Training Courses and Workshops

Schools providing training courses, certificates, diplomas or degree programs of Hacker/Hacking Tech. And Skills




Total 581 training courses and degree programs available around the world.

United States - United Kingdom - Canada - Australia - India

Popular courses:
ETHICAL HACKING
Computer Hacking Forensics Investigator (CHFI)
Computer hacking forensic investigator (CHFI)
ANTI-HACKING Special
ANTI-HACKING Workshop
Voice Anti-Hacking Workshop


Certified Hacking Forensic Investigator (CHFI)

Course Format: Classroom
School/Trainer: ISInc
Training Center(s)/Venue(s): Sacramento, United States
  V

CHFI v8 is a comprehensive course covering major forensic investigation scenarios that enables students to acquire necessary hands-on experience regarding various forensic investigation techniques. Learn how to utilize standard forensic tools to successfully carryout a computer forensic investigation which can better prepare you to aid in the prosecution of perpetrators.

CEH v9 (Certificate)

Course Format: Classroom
School/Trainer: ISInc
Training Center(s)/Venue(s): Sacramento, United States
  V

Prepare for the new Certified Ethical Hacker version 9 (CEHv9) exam with this five day, instructor-led course.
This comprehensive, in-depth review of CEH certification requirements is designed to help you internalize critical information using concise, to-the-point explanations and an easy-to-follow approach to the material. Covering all sections of the exam, the discussion highlights essential topics like intrusion detection, DDoS attacks, buffer overflows, and malware creation in detail, and puts the concepts into the context of real-world scenarios. Each chapter is mapped to the corresponding exam objective for easy reference, and the Exam Essentials feature helps you identify areas in need of further study. You also get access to online study tools including chapter review questions, full-length practice exams, hundreds of electronic flashcards, and a glossary of key terms to help you ensure full mastery of the exam material.
The Certified Ethical Hacker is one-of-a-kind in the cybersecurity sphere, allowing you to delve into the mind of a hacker for a unique perspective into penetration testing. This guide is your ideal exam preparation resource, with spe... [Read More]

Certified Ethical Hacker (CEH)

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

The Certified Ethical Hacker (CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over $100,000 per year. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.

CHFI Computer Hacking Forensic Investigator (Certificate)

Course Format: Classroom
School/Trainer: GTC Economic Development and Corporate Training
Training Center(s)/Venue(s): Greenville, Simpsonville, Taylors, United States
  V

CHFI certifies individuals in the specific security discipline of computer forensics from a vendor-neutral perspective. The CHFI certification will fortify the application knowledge of law enforcement personnel, system administrators, security officers, defense and military personal, legal professionals, bankers, security professionals, and anyone who is concerned about the integrity of the network infrastructure.

Certified Ethical Hacker (CEH)

Course Format: Classroom
School/Trainer: Anne Arundel Community College
Training Center(s)/Venue(s): Annapolis, Arnold, Baltimore, Edgewater, Gambrills, Hanover, Laurel, Severn, United States

Please click on the training course title to find contact information and links to Anne Arundel Community College's website.

CEH (Certificate)

Course Format: Classroom
School/Trainer: Global Knowledge USA
Training Center(s)/Venue(s): Arlington, Atlanta, Cary, Irving, Morristown, New York City, Santa Clara, Schaumburg, Seattle, United States
  V

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

This course prepares you for the Ethical Hacking and Countermeasures examination 312-50 / the Certified Ethical Hacker certification awarded by the EC-Council. The Ethical Hacking and Countermeasures curriculum for Version 9 consists of 20 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training. An intensive course which compr... [Read More]

CEH (Certificate)

Course Format: Classroom
School/Trainer: Global Knowledge Canada
Training Center(s)/Venue(s): Halifax, Mississauga, Montreal, Ottawa, Toronto, Winnipeg, Canada
  V

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

This course prepares you for the Ethical Hacking and Countermeasures examination 312-50 / the Certified Ethical Hacker certification awarded by the EC-Council. The Ethical Hacking and Countermeasures curriculum for Version 9 consists of 20 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training. An intensive course which compr... [Read More]

CEH (Certificate)

Course Format: Classroom
School/Trainer: Global Knowledge UK
Training Center(s)/Venue(s): Aberdeen, Bath, Bristol, Leeds, London, Wokingham, United Kingdom
  V

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then be led into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

This course prepares you for the Ethical Hacking and Countermeasures examination 312-50 / the Certified Ethical Hacker certification awarded by the EC-Council. The Ethical Hacking and Countermeasures curriculum for Version 9 consists of 20 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training. An intensive course which compr... [Read More]

Network Penetration Testing and Ethical Hacking

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Develop tailored scoping and rules of engagement for penetration testing projects to ensure the work is focused, well defined and conducted in a safe manner

## Conduct detailed reconnaissance using document metadata, search engines and other publicly available information sources to build a technical and organizational understanding of the target environment

## Utilize the Nmap scanning tool to conduct comprehensive network sweeps, port scans, Operating System fingerprinting and version scanning to develop a map of target environments

## Choose and properly execute Nmap Scripting Engine scripts to extract detailed information from target systems

## Configure and launch the Nessus vulnerability scanner so that it discovers vulnerabilities through both authenticated and unauthenticated scans in a safe manner, and customize the output from such tools to represent the business risk to the organization

## Analyze the output of scanning tools to manually verify findings and perform false positive reduction using Netcat and the Scapy packet crafting tools

## Utilize the Windows and Linux command lines to plu... [Read More]

Advanced Penetration Testing, Exploit Writing, and Ethical Hacking

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

This course designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP)... [Read More]

Mobile Device Security and Ethical Hacking

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

This course is designed to give you the skills you need to understand the security strengths and weaknesses in Apple iOS, Android, and wearable devices including Apple Watch and Android Wear. With these skills, you will evaluate the security weaknesses of built-in and third party applications. You&,#146,ll learn how to bypass platform encryption, and how to manipulate Android apps to circumvent obfuscation techniques. You&,#146,ll leverage automated and manual mobile application analysis tools to identify deficiencies in mobile app network traffic, file system storage, and inter-app communication channels. You&,#146,ll safely work with mobile malware samples to understand the data exposure and access threats affecting Android and iOS devices, and you&,#146,ll exploit lost or stolen devices to harvest sensitive mobile application data.

Course Content

SEC575.1: Device Architecture and Common Mobile Threats

SEC575.2: Mobile Platform Access and Application Analysis

SEC575.3: Mobile Application Reverse Engineering

SEC575.4: Penetration Testing Mobile Devices, Part 1

SEC575.5: Penetration Testing Mob... [Read More]

Immersive Hands-On Hacking Techniques

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Use network scanning and vulnerability assessment tools to effectively map out networks and prioritize discovered vulnerabilities for effective remediation.

## Use password analysis tools to identify weak authentication controls leading to unauthorized server access.

## Evaluate web applications for common developer flaws leading to significant data loss conditions.

## Manipulate common network protocols to maliciously reconfigure internal network traffic patterns.

## Identify weaknesses in modern anti-virus signature and heuristic analysis systems.

## Inspect the configuration deficiencies and information disclosure threats present on Windows and Linux servers.

## Bypass authentication systems for common web application implementations.

## Exploit deficiencies in common cryptographic systems.

## Bypass monitoring systems by leveraging IPv6 scanning and exploitation tools.

## Harvest sensitive mobile device data from iOS and Android targets.

Web App Penetration Testing and Ethical Hacking

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Apply a detailed, four-step methodology to your web application penetration tests: reconnaissance, mapping, discovery, and exploitation.

Analyze the results from automated web testing tools to validate findings, determine their business impact, and eliminate false positives.

Manually discover key web application flaws.

Use Python to create testing and exploitation scripts during a penetration test.

Discover and exploit SQL Injection flaws to determine true risk to the victim organization.

Create configurations and test payloads within other web attacks.

Fuzz potential inputs for injection attacks.

Explain the impact of exploitation of web application flaws.

Analyze traffic between the client and the server application using tools such as the Zed Attack Proxy and Burp Suite to find security issues within the client-side application code.

Manually discover and exploit Cross-Site Request Forgery (CSRF) attacks.

Use the Browser Exploitation Framework (BeEF) to hook victim browsers, attack client software and the network, and evaluate the potential impact that XS... [Read More]

Hacker Tools, Techniques, Exploits and Incident Handling

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V


Apply incident handling processes-including preparation, identification, containment, eradication, and recovery-to protect enterprise environments

## Analyze the structure of common attack techniques in order to evaluate an attacker&,#146,s spread through a system and network, anticipating and thwarting further attacker activity

## Utilize tools and evidence to determine the kind of malware used in an attack, including rootkits, backdoors, and Trojan horses, choosing appropriate defenses and response tactics for each

## Use built-in command-line tools such as Windows tasklist, wmic, and reg, as well as Linux netstat, ps, and lsof to detect an attacker&,#146,s presence on a machine

## Analyze router and system ARP tables along with switch CAM tables to track an attacker&,#146,s activity through a network and identify a suspect

## Use memory dumps and memory analysis tools to determine an attacker&,#146,s activities on a machine, the malware installed, and other machines the attacker used as pivot points across the network

## Gain access to a target machine using Metasploit, and then detecti... [Read More]

Computer Hacking Forensic Investigator (CHFI) (Certificate)

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

CHFIv8 curriculum consists of 22 instructor-led training modules.
## Computer Forensics in Today’s World
## Computer Forensics Investigation Process
## Searching and Seizing Computers
## Digital Evidence
## First Responder Procedures
## Computer Forensics Lab
## Understanding Hard Disks and File Systems
## Windows Forensics
## Data Acquisition and Duplication
## Recovering Deleted Files and Deleted Partitions
## Forensics Investigation Using AccessData FTK
## Forensics Investigation Using EnCase
## Steganography and Image File Forensics
## Application Password Crackers
## Log Capturing and Event Correlation
## Network Forensics, Investigating Logs and Investigating Network Traffic
## Investigating Wireless Attacks
## Investigating Web Attacks
## Tracking Emails and Investigating Email Crimes
## Mobile Forensics
## Investigative Reports
## Becoming an Expert Witness

CEH (Certificate)

Course Format: Classroom
School/Trainer: Global Knowledge UAE
Training Center(s)/Venue(s): Abu Dhabi, Dubai, United Arab Emirates
  V

Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
System Hacking
Trojans and Backdoors
Viruses and Worms
Sniffers
Social Engineering
Denial of Service
Session Hijacking
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Evading IDS, Firewalls, and Honeypots
Buffer Overflows
Cryptography
Penetration Testing

Network Penetration Testing and Ethical Hacking

Course Format: Classroom
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V


Develop tailored scoping and rules of engagement for penetration testing projects to ensure the work is focused, well defined and conducted in a safe manner

## Conduct detailed reconnaissance using document metadata, search engines and other publicly available information sources to build a technical and organizational understanding of the target environment

## Utilize the Nmap scanning tool to conduct comprehensive network sweeps, port scans, Operating System fingerprinting and version scanning to develop a map of target environments

## Choose and properly execute Nmap Scripting Engine scripts to extract detailed information from target systems

## Configure and launch the Nessus vulnerability scanner so that it discovers vulnerabilities through both authenticated and unauthenticated scans in a safe manner, and customize the output from such tools to represent the business risk to the organization

## Analyze the output of scanning tools to manually verify findings and perform false positive reduction using Netcat and the Scapy packet crafting tools

## Utilize the Windows and Linux command lines to plu... [Read More]

Advanced Penetration Testing, Exploit Writing, and Ethical Hacking

Course Format: Classroom
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V

This course designed as a logical progression point for those who have completed SANS SEC560: Network Penetration Testing and Ethical Hacking, or for those with existing penetration testing experience. Students with the prerequisite knowledge to take this course will walk through dozens of real-world attacks used by the most seasoned penetration testers. The methodology of a given attack is discussed, followed by exercises in a hands-on lab to consolidate advanced concepts and facilitate the immediate application of techniques in the workplace. Each day of the course includes a two-hour evening boot camp to drive home additional mastery of the techniques discussed. A sample of topics covered includes weaponizing Python for penetration testers, attacks against network access control (NAC) and virtual local area network (VLAN) manipulation, network device exploitation, breaking out of Linux and Windows restricted environments, IPv6, Linux privilege escalation and exploit-writing, testing cryptographic implementations, fuzzing, defeating modern OS controls such as address space layout randomization (ASLR) and data execution prevention (DEP), return-oriented programming (ROP)... [Read More]

Mobile Device Security and Ethical Hacking

Course Format: Classroom
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V

This course is designed to give you the skills you need to understand the security strengths and weaknesses in Apple iOS, Android, and wearable devices including Apple Watch and Android Wear. With these skills, you will evaluate the security weaknesses of built-in and third party applications. You&,#146,ll learn how to bypass platform encryption, and how to manipulate Android apps to circumvent obfuscation techniques. You&,#146,ll leverage automated and manual mobile application analysis tools to identify deficiencies in mobile app network traffic, file system storage, and inter-app communication channels. You&,#146,ll safely work with mobile malware samples to understand the data exposure and access threats affecting Android and iOS devices, and you&,#146,ll exploit lost or stolen devices to harvest sensitive mobile application data.

Course Content

SEC575.1: Device Architecture and Common Mobile Threats

SEC575.2: Mobile Platform Access and Application Analysis

SEC575.3: Mobile Application Reverse Engineering

SEC575.4: Penetration Testing Mobile Devices, Part 1

SEC575.5: Penetration Testing Mob... [Read More]

Immersive Hands-On Hacking Techniques

Course Format: Classroom
School/Trainer: Global Knowledge India
Training Center(s)/Venue(s): Bangalore, Chennai, Delhi, Pune, India
  V


Use network scanning and vulnerability assessment tools to effectively map out networks and prioritize discovered vulnerabilities for effective remediation.

## Use password analysis tools to identify weak authentication controls leading to unauthorized server access.

## Evaluate web applications for common developer flaws leading to significant data loss conditions.

## Manipulate common network protocols to maliciously reconfigure internal network traffic patterns.

## Identify weaknesses in modern anti-virus signature and heuristic analysis systems.

## Inspect the configuration deficiencies and information disclosure threats present on Windows and Linux servers.

## Bypass authentication systems for common web application implementations.

## Exploit deficiencies in common cryptographic systems.

## Bypass monitoring systems by leveraging IPv6 scanning and exploitation tools.

## Harvest sensitive mobile device data from iOS and Android targets.

Pages: 1 2 3 4 5 6 ...


Find Hacking training courses, certificates, diplomas and degrees in Countries:



Australia - Canada - India - Indonesia - Ireland - Malaysia - New Zealand
Pakistan - Philippines - Singapore - South Africa - United Arab Emirates
United Kingdom - United States



Tips:
You do not need to register before you can use most of our services. You will get a code for each posting ever made on this website. It is the key for you to remove the posting anytime by yourself.



- Other Topics -
- Online/E-learning -
Hacking
Ask for Training
Add Courses