ONLINE ETHICAL HACKING COURSE FROM NEONETWIRELESS

Learn Ethical Hacking from home — save up to N30,000


Hacker Training Course Overview

Our most popular information security and hacking training covers the techniques used by malicious, black hat hackers with high energy lectures and hands-on lab exercises. While these hacking skills can be used for malicious purposes, this class teaches you how to use the same hacking techniques to perform a white-hat, ethical hack, on your organization. You’ll leave with the ability to quantitatively assess and measure threats to information assets, and discover where your organization is most vulnerable to hacking in this network security training course.
The goal of this course is to help you master a repeatable, documentable penetration testing methodology that can be used in an ethical penetration testing or hacking situation. This ethical hacking training course has a significant return on investment since you gain hacking skills that are highly in demand, as well as two certifications, the EC-Council Certified Ethical Hacker and the CompTIA PenTest+.

Learn from Experts

We don’t just have great instructors, our instructors have years of industry experience and are recognized as experts. Infosec instructors have authored two of the top Network Security and Ethical Hacking books.

Constantly Updated Training

Black Hat hackers are always changing their tactics to get one step ahead of the good guys. Infosec updates our course materials regularly to ensure that you learn about the current threats to your organization’s networks and systems.
DURATION: 5 WEEKS

COURSE FEE:40,000

PAYMENT IS FLEXIBLE(IT CAN BE SPREAD INTO 2 INSTALLMENTS)

PREREQUISITE: BASIC KNOWLEDGE OF COMPUTER NETWORKING IS A MUST

COURSE OUTLINES

MODULE 1

Network Scanning – nmap, amap, unicornscan, hping, idle scan, ARP scan
MODULE 2
Enumeration – NetBIOS, DNS, SNMP, LDAP, NTP, metadata
Extended MitM – DHCP starvation, VLAN Hopping, MAC flooding, APR, SPAN, network stack scripting, fake Aps
MODULE 3
System attacks – local system attack, dump and hash sniffing attacks, hash injection, Rainbow Tables, CUDA
Trojan and Backdoors – how the malware works, creating botnets, DDOS, hiding and masking techniques, Trojan Constructino Kits
Viruses nad worms – definition of various types and spread methodology
MODULE 4
Social engineering – fake websites, personal social engineering, Spear phishing, malware deployment
Session Hijacking – taking over TCP or http session and cyber identity theft
MODULE 5
Hacking Web Servers – DoS and DdoS, Bruteforcing, cloning, vulnerability research, http split, defacement
Hacking Web Applications – mapping applications, XSS, CSRF, RFI, LFI, hidden field manipulation
SQL injection, LDAP injection
MODULE 6
Hacking Wireless Networks – Advanced techniques of breaking WEP, WPA1/@-PSK, WPS, fake Aps
Hacking of mobile platforms

BENEFITS

1.After the training,students can be able to hack into websites,mobiles phones,web servers remotely etc
2.Students can also be able to hack into wireless encrypted networks,Harvest usernames/passwords of gmail accounts,facebook accounts,Yahoo-mail accounts,Instagram accounts,HTTP and HTTPS sites.
3.After the training, students can be able to do google phishing and Malware attacks
4.After the training, students can be able to do MITM(Man in the Middle attack) ,ssl strip,router exploit,Computer LAN Hacks etc

DISCLAIMER
   This is for Educational purposes only,Neonetwireless is not responsible for action that this will lead to.Please do not misuse it.

Contact us: 
Neonetwireless Ng 39A Ayilara Street Off Ojuelegba road Surulere Lagos. 
08037676772,08188267100,08181355444,08023365905
neonetwireless@gmail.com
Info@neonetwireless@gmail.com

Reactions

Post a Comment

0 Comments