5 Days Ethical Hacking Specialization

Multiday, 15/01/2024 - 13/12/2024

Venue

Tertiary Courses Malaysia G-3A-02, Corporate Office Suite, KL Gateway, No 2, Jalan kerinchi, Gerbang kernichi Lestari

Entrance Fee

NA

Category

Science & Technology

Event Type

Class, Course, Training or Workshop

Share

Schedule

DateTime
15/01/20249:30 AM - 5:30 PM
16/01/20249:30 AM - 5:30 PM
17/01/20249:30 AM - 5:30 PM
18/01/20249:30 AM - 5:30 PM
19/01/20249:30 AM - 5:30 PM
19/02/20249:30 AM - 5:30 PM
20/02/20249:30 AM - 5:30 PM
21/02/20249:30 AM - 5:30 PM
22/02/20249:30 AM - 5:30 PM
23/02/20249:30 AM - 5:30 PM
18/03/20249:30 AM - 5:30 PM
19/03/20249:30 AM - 5:30 PM
20/03/20249:30 AM - 5:30 PM
21/03/20249:30 AM - 5:30 PM
22/03/20249:30 AM - 5:30 PM
15/04/20249:30 AM - 5:30 PM
16/04/20249:30 AM - 5:30 PM
17/04/20249:30 AM - 5:30 PM
18/04/20249:30 AM - 5:30 PM
19/04/20249:30 AM - 5:30 PM
13/05/20249:30 AM - 5:30 PM
14/05/20249:30 AM - 5:30 PM
15/05/20249:30 AM - 5:30 PM
16/05/20249:30 AM - 5:30 PM
17/05/20249:30 AM - 5:30 PM
10/06/20249:30 AM - 5:30 PM
11/06/20249:30 AM - 5:30 PM
12/06/20249:30 AM - 5:30 PM
13/06/20249:30 AM - 5:30 PM
14/06/20249:30 AM - 5:30 PM
15/07/20249:30 AM - 5:30 PM
16/07/20249:30 AM - 5:30 PM
17/07/20249:30 AM - 5:30 PM
18/07/20249:30 AM - 5:30 PM
19/07/20249:30 AM - 5:30 PM
12/08/20249:30 AM - 5:30 PM
13/08/20249:30 AM - 5:30 PM
14/08/20249:30 AM - 5:30 PM
15/08/20249:30 AM - 5:30 PM
16/08/20249:30 AM - 5:30 PM
09/09/20249:30 AM - 5:30 PM
10/09/20249:30 AM - 5:30 PM
11/09/20249:30 AM - 5:30 PM
12/09/20249:30 AM - 5:30 PM
13/09/20249:30 AM - 5:30 PM
14/10/20249:30 AM - 5:30 PM
15/10/20249:30 AM - 5:30 PM
16/10/20249:30 AM - 5:30 PM
17/10/20249:30 AM - 5:30 PM
18/10/20249:30 AM - 5:30 PM
11/11/20249:30 AM - 5:30 PM
12/11/20249:30 AM - 5:30 PM
13/11/20249:30 AM - 5:30 PM
14/11/20249:30 AM - 5:30 PM
15/11/20249:30 AM - 5:30 PM
09/12/20249:30 AM - 5:30 PM
10/12/20249:30 AM - 5:30 PM
11/12/20249:30 AM - 5:30 PM
12/12/20249:30 AM - 5:30 PM
13/12/20249:30 AM - 5:30 PM
5 Days Ethical Hacking Specialization
 

What is ethical hacking? When it comes to cybersecurity, hacking comes in many colors: white, grey, black, and shades in between. White hat hackers use their skills for good. They practice ethical hacking: involved testing to see if an organization's network is vulnerable to outside attacks.

Ethical hacking is key to strengthening network security, and it's one of the most desired skills for any IT security professional. Ethical hacking is the ability to identify vulnerabilities in an organization's network or infrastructure, and then address the issues to prevent incidents or attacks. Learn how to perform penetration testing and gain the knowledge and skills you need for a career in information security.

If you're interested in becoming an ethical hacker, or getting started securing your own network, this introduction is for you. 

Certificate

All participants will receive a Certificate of Completion from Tertiary Courses after achieved at least 75% attendance.

Funding and Grant

HRDF SBL Claimable for Employers Registered with HRDF

HRDF claimable

Course Code: M1241

Day 1 - Topic 1 Introduction to Ethical Hacking

  • Topic 1.1: Overview of Ethical Hacking Overview
  • Topic 1.2: Footprinting and Reconnaissance
  • Topic 1.3: Scanning Network
  • Topic 1.4: Enumeration

Day 2 - Topic 2 Vulnerability Analysis

  • Topic 2.1: Vulnerability Analysis
  • Topic 2.2: System Hacking
  • Topic 2.3: Malware Analysis
  • Topic 2.4: Sniffers
  • Topic 2.5: Scanning Network

Day 3 - Topic 3 Ethical Hacking Techniques

  • Topic 3.1: Social Engineering
  • Topic 3.2: Denial of Service
  • Topic 3.3: Session Hijacking
  • Topic 3.4: Evading IDS, Firewalls, and Honeypots 

Day 4 - Topic 4 Ethical Hacking on Network and IoT Devices

  • Topic 4.1  Hacking Web Servers and Web Applications
  • Topic 4.2: Wireless Networks
  • Topic 4.3 Mobile Devices and Platforms
  • Topic 4.4 Hacking IoT Devices

Day 5  - Topic 5  Ethical,  Penetration, Cryptography

  • Topic 5.1 Crytography 
  • Topic 5.2: Cloud Computing
  • Topic 5.3: Penetrating Testing