Class Details

Price: $1,990

Course Includes:

  • Class exercises in addition to training instruction
  • Courseware books, notepads, pens, highlighters and other materials
  • Full breakfast with variety of bagels, fruits, yogurt, doughnuts and juice
  • Tea, coffee, and soda available all day
  • Freshly baked cookies every afternoon - * only at participating locations


Get Your Group Trained for Less with Our Federal Training Dollars Savings Plan

Course Outline

Part 1: Hacker Techniques and Tools

Lesson 1:

Hacking: The Next Generation

Lesson 2:

TCP/IP Review

Lesson 3:

Cryptographic Concepts

Lesson 4:

Physical Security

Part 2: A Technical Overview of Hacking

Lesson 5:

Footprinting Tools and Techniques

Lesson 6:


Lesson 7:

Enumeration and Computer System Hacking

Lesson 8:

Wireless Vulnerabilities

Lesson 9:

Web and Database Attacks

Lesson 10:

Trojans and Backdoors

Lesson 11:

Malware, Worms, and Computer Viruses

Lesson 12:

Sniffers, Session Hijacking, and Denial of Service

Lesson 13:

Linux, Live CDs, and Automated Assessment Tools

Part 3: Incident Response and Defensive Technologies

Lesson 14:

Incident Response

Lesson 15:

Defensive Technologies


Upon successful completion of this class, students will be able to do the following:

·         Explain the history and current state of hacking and penetration testing, including ethical and legal implications.

·         Describe cryptology.

·         Identify common information gathering tools and techniques.

·         Analyze system vulnerabilities exploited by hackers.

·         Perform web and database attacks.

·         Remove trojans, backdoors, and malware from infected systems.

·         Perform network traffic analysis and sniffing by using appropriate tools.

·         Analyze wireless network vulnerabilities exploited by hackers.

·         Perform incident handling by using appropriate methods.