Ethical Hacking | Modern Management Training Center
+201091882387Call Us Any Time

Ethical Hacking


Ethical Hacking


Program Objectives

By the end of the program, participants will be able to: 

  1. Understand how perimeter defenses function by ethically scanning and attacking networks
  2. Conduct information systems security audits by understanding the latest security threats, advanced attack vectors, hacking techniques, methodologies and security measures
  3. Identify intruders, understand how they escalate privileges, and take the necessary steps to secure a system
  4. Conduct vulnerability assessments, risk assessments, penetration testing, and system protection measures
  5. Create policies and apply countermeasures against social engineering, Distributed Denial-of- Service (DDoS) attacks, buffer overflows, and virus creation
  6. Apply countermeasures to secure mobile infrastructure against the attacks to mobile platforms and tablet computers

Beneficiaries

IT professionals, security professionals, auditors, site administrators, general management and anyone tasked with managing and protecting the integrity of the network infrastructure. This also includes anyone already familiar and involved with IT/Cyber/Digital Security and seeking to build on their fundamental principles of security.

Contents

Introduction to Ethical Hacking: 

  • Key issues plaguing the information security world
  • System fundamentals
  • Incident management processes

 

Identifying the Systems at Risk: 

  • Wireless networking
  • Mobile platform security guidelines and tools
  • Web servers and Web applications
  • Footprinting tools and reconnaissance
  • Scanning networks
  • Enumeration of services

 

System Hacking Techniques and Countermeasures: 

  • Types of Trojans
  • Working of viruses
  • Computer worms and covert channels
  • Sniffers
  • Social engineering
  • Denial of Service (DoS)
  • Cryptography, Public Key Infrastructure (PKI) and cryptanalysis tools 

 

Hacking your Own System: 

  • Gaining access to a system
  • Session hijacking
  • Wireless hacking tools
  • Hacking mobile platforms
  • Structured Query Language (SQL) injection
  • Evading an Intrusion Detection System (IDS), firewalls, and honeypots

 

Penetration Testing: 

  • Types of penetration testing
  • Vulnerability assessment
  • Penetration testing roadmap

Training methods

  • The Training lectures.
  • The Group discussions.
  • The Training Workshops.

Places and dates for this program

26 Jul 2026 : 30 Jul 2026 2000 $

21 Dec 2026 : 25 Dec 2026 2500 $


Etisalat
Ministry of Heals
Saudi Arabian Airlines
Arabia Insurance Cooperative Company
Ministry of Housing
Dorectprate of Human Resources - Sharjah
Sharjah Electricity & Water Authority
The Holding Company for Water Supply and Sewerage
Epsco

Back to Top