Ethical Hacker

Ethical Hacker Overview:

The main goal of ethical hackers is to protect networks and perform penetration testing that keeps digital assets safe. Ethical hackers stay up to date on the latest security threats including viruses, trojans, and other malware. They test hardware and software on the company network. They make sure that other security teams understand common security risks and help monitor the network for any suspicious behavior.

By completing this training path you will earn up to 116 CEUs.

CompTIA A+ 900 Certification Training Series

Course 01 - Configuring BIOS
Course 02 - Motherboards
Course 03 - Expansion Slots
Course 04 - RAM Types and Features
Course 05 - Install and Configure PC Expansion Cards
Course 06 - Install and Configure Storage Devices
Course 07 - CPU's and Cooling Methods
Course 08 - PC Connection Interfaces
Course 09 - Power Supplies
Course 10 - Custom Computer Specifications
Course 11 - Installing Displays
Course 12 - PC Connectors
Course 13 - Installing Peripheral
Course 14 - Installing Multifunction Devices and SOHO Networks
Course 15 - Printer Technologies
Course 16 - Printer Maintenance
Course 17 - Networking
Course 18 - Properties and Characteristics of TCP/IP
Course 19 - TCP vs. UDP
Course 20 - Wi-Fi Networking Standards and Encryption Types
Course 21 - Install and Configure SOHO Wireless/Wired Router
Course 22 - Architecture and Internet Connection Types
Course 23 - Networking Tools
Course 24 - Laptop Hardware Components
Course 25 - Mobile Devices
Course 26 - Mobile Device Ports and Accessories
Course 27 - Troubleshooting Theory
Course 28 - Troubleshooting RAID Arrays and Hard Drives
Course 29 - Troubleshooting Video
Course 30 - Troubleshooting Network Issues
Course 31 - Troubleshooting Printers
Course 32 - Windows Operating Systems
Course 33 - Command Line Tools
Course 34 - Microsoft Operating System Features and Tools
Course 35 - Control Panel Utilities
Course 36 - Windows Networking on Client Desktops
Course 37 - Preventative Maintenance
Course 38 - Features and Functionality of the Mac OS and Linux Operating Systems
Course 39 - Client Side Virtualization
Course 40 - Cloud-based Concepts
Course 41 - Network Host Properties
Course 42 - Mobile Operating Systems
Course 43 - Mobile Device Network and E-mail
Course 44 - Security
Course 45 - Prevention Methods
Course 46 - Windows Security Settings
Course 47 - Security Best Practices
Course 48 - Securing Mobile Devices
Course 49 - Troubleshooting Common PC Tools
Course 50 - Common PC Security Issues
Course 51 - Common Mobile Operating Systems Troubleshooting
Course 52 - Common Safety Practices
Course 53 - Maintenance Tools and Techniques
Course 54 - Privacy and Licensing Concepts

Cisco CCNA Interconnecting Cisco Networking Devices Part 1 (ICND1) Training Series

Course 01 - Building a Simple Network
Course 02 - Establishing Internet Connectivity
Course 03 - Managing Network Device Security
Course 04 - Building a Medium-Sized Network
Course 05 - Introducing IPv6

Cisco CCNA Interconnecting Cisco Networking Devices Part 2 (ICND2) Training Series

Course 01 - Implementing Scalable Medium-Sized Networks
Course 02 - Troubleshooting Basic Connectivity
Course 03 - Implementing an EIGRP-Based Solution
Course 04 - Implementing a Scalable, Multiarea Network, OSPF-Based Solution
Course 05 - Wide-Area Networks
Course 06 - Network Device Management

CompTIA Security+ Certification Training Series

Course 01 - Security Fundamentals
Course 02 - Identifying Security Threats and Vulnerabilities
Course 03 - Managing Data, Application, and Host Security
Course 04 - Implementing Network Security
Course 05 - Implementing Access Control, Authentication, and Account Management
Course 06 - Managing Certificates
Course 07 - Implementing Compliance and Operational Security
Course 08 - Risk Management
Course 09 - Troubleshooting and Managing Security Incidents
Course 10 - Business Continuity and Disaster Recovery Planning

Certified Information Systems Auditor (CISA) Training Series

Course 01 - The Process of Auditing Information Systems
Course 02 - Governance and Management of IT
Course 03 - Information Systems Acquisition, Development and Implementation
Course 04 - Information Systems Operations, Maintenance and Support
Course 05 - Protection of Information Assets

Certified Information Systems Security Professional (CISSP) Training Series

Course 01 - Security and Risk Management
Course 02 - Asset Security
Course 03 - Security Engineering
Course 04 - Communication and Network Security
Course 05 - Identity and Access Management
Course 06 - Security Assessment and Testing
Course 07 - Security Operations
Course 08 - Software Development Security

Certified Professional Ethical Hacker Training Series

Course 01 - Security Fundamentals
Course 02 - Access Controls
Course 03 - Protocols
Course 04 - Cryptography
Course 05 - Why Vulnerability Assessments?
Course 06 - Vulnerability Tools of the Trade
Course 07 - Output Analysis and Reports
Course 08 - Reconnaisance, Enumeration and Scanning
Course 09 - Gaining Access
Course 10 - Maintaining Access
Course 11 - Covering Tracks
Course 12 - Malware
Course 13 - Buffer Overflows
Course 14 - Password Cracking

Leave Us a Message