This cyber security course immerses the students into an interactive environment where they are shown how to scan, test, hack and secure their own systems - ethically. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential cyber security systems.

Students begin by understanding how perimeter defences work and how to scan and attack their own networks, no real network is harmed. Finally, students then learn how intruders escalate privileges and what steps can be taken to secure a system.

Course outline

  • Introduction to Ethical Hacking
  • Footprinting and reconnaissance
  • Scanning networks
  • Enumeration
  • System hacking
  • Malware Threats
  • Evading IDS, Firewalls and Honeypots
  • Sniffers
  • Social engineering
  • Denial of Service (DoS)
  • Session hijacking
  • Hijacking webservers
  • Hacking web applications
  • SQL injection
  • Hacking wireless networks
  • Hacking Mobile Platforms
  • Cloud Computing
  • Cryptography



  • Knowledge of TCP/IP
  • Basic knowledge of Information Systems
  • Basic knowledge of Networking


Who should attend?

  • IT Security Officers
  • Auditors
  • Security professionals
  • Site Administrators
  • Anyone who is concerned about the integrity of the network infrastructure


Learning outcomes

By the end of this course, students would be able to understand:

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and countermeasures