This course is designed for individuals who have basic computer user skills and who are interested in obtaining an entry-level job in Cybersecurity. The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
-
Learning Objectives
Cybersecurity Bootcamp Program Objectives
- Identify basic network theory concepts and major network communications methods
- Describe bounded network media
- Identify unbounded network media
- Identify the major types of network implementations
- Identify TCP/IP addressing and data delivery methods
- Implement routing technologies
- Identify the major services deployed on TCP/IP networks
- Identify the infrastructure of a WAN implementation
- Identify the components used in cloud computing and virtualization
- Describe basic concepts related to network security
- Prevent security breaches
- Respond to security incidents
- Identify the components of a remote network implementation
- Identify the tools, methods, and techniques used in managing a network
- Describe troubleshooting of issues on a network
- Identify the hardware components of personal computers and mobile digital devices
- Identify the basic components and functions of operating systems
- Identify networking and security fundamentals
- Identify the operational procedures that should be followed by professional PC technicians
- Install, configure, and troubleshoot display devices. Install and configure peripheral components
- Manage system components
- Manage data storage
- Install and configure Microsoft Windows
- Optimize and maintain Microsoft Windows
- Work with other operating systems
- Identify the hardware and software requirements for client environment configurations
- Identify network technologies
- Install and configure networking capabilities
- Support mobile digital devices
- Support printers and multifunction devices
- Identify security threats, vulnerabilities, and controls
- Implement security controls
- Troubleshoot system-wide issues
-
Training Purpose
-
Delivery Method