Hacking Online Training Courses & Degree Programs

Schools providing online certificates, diplomas or degrees for Hacker/Hacking Tech. And Skills


Total 34 online training courses and degree programs available.

Advanced Hacking Online: Expert Pen Testing - Online

School/Trainer: InfoSec Institute
Elmwood Park, United States
  V

Advanced Hacking Online is the online version of the popular Advanced Ethical Hacking course from InfoSec Institute. If you can&,#146,t get away to attend Advanced Ethical Hacking due to work duties, budget or time constraints, Advanced Hacking Online is a good option to meet your professional development goals.

We&,#146,ve made every effort to replicate the same training experience you would receive in our instructor-led Advanced Ethical Hacking course. InfoSec Institute’s Advanced Hacking Online includes a shipment of software that is loaded onto your computer, which allows you to complete over 20 hours of hands-on lab exercises! Not only do you get high quality instruction from an expert instructor, with InfoSec Institute, you also perform hands-on lab exercises that allow for real knowledge transfer.

Some of the benefits of Advanced Hacking Online are:
Interact with 20 online modules, taught by an expert instructor.
We ship you a number of Virtual Machines (VMs) pre-installed with hundreds of tools and scripts that you use to perform over 31 hands-on lab exercises. These are the same lab exercises as the instructor-led class.
Get online guidance while you perform the lab exercises, the labs have been recorded from start to finish.
Prepare yourself for the CEPT and ECSA certifications from home. When you purchase Adva... [Read More]

CEH v9 - Online

School/Trainer: InfoSec Institute
Elmwood Park, United States
  V

These are some of the many concepts you will learn to master during this hands on hacking course�

Penetration testing methodologies
Stealthy network recon
Passive traffic identification
Remote root vulnerability exploitation
Privilege escalation hacking
IPv6 Vulnerabilities
Gaining remote access through a trojan
Running shellcode in RAM vs. on disk
Wireless insecurity
Breaking IP-based ACLs via spoofing
Abusing Windows named pipes for domain impersonation
Evidence removal and anti-forensics
Attacking network infrastructure devices
Hacking by brute forcing remotely
Hiding exploit payloads in jpeg and gif image files
Hacking web applications
Breaking into databases with SQL injection
Cross-site scripting
Hacking into Cisco routers
Justifying a penetration test to management &, customers
CEH review
Defensive techniques
Exploit systems using Metasploit Pro

What You&,#146,ll DO

Capture the flag hacking exercises every night!

Abusing DNS for host identification

Leaking system information from Unix and Windows

Windows 2012 Server &, Windows 8 DNS cache poisoning attacks

Unix, Windows and Cisco password cracking

Remote buffer overflow exploit lab - heap vs. stack overfl... [Read More]

Advanced Hacking - Online

School/Trainer: Intense School
Atlanta, Chicago, Cleveland, Dallas, Las Vegas, New York City, Orlando, Seattle, Washington DC, United States
  V

In Advanced Hacking Online is the online version of the popular Advanced Ethical Hacking course from Intense School. If you cannot get away to attend Advanced Ethical Hackingdue to work duties, budget or time constraints, Advanced Hacking Online s a good option to meet your professional development goals.

Rest assured, we have made every effort to replicate the same training experience you would receive in our Instructor-Led Advanced Ethical Hacking course. Many online or CBT training offerings are simply a recording of a talking head. Intense School&,#146,s Advanced Hacking Online includes a shipment of software that is loaded onto your computer, which allows you to complete over 30 hours of hands-on lab exercises! Not only do you get high quality instruction from an expert instructor, with Intense School, you also perform hands-on lab exercises that allow for real knowledge transfer.

Some of the topics you will learn to master during the course:
Writing buffer overflow exploits
dlmalloc Heap Overflow exploits
Win32 Heap Overflow exploits
Linux stack overflow exploits
Defeating non-exec stacks
Return-to-libc shellcode
Function pointer overwrites
Crafting Injectable Shellcode
Defeating non-executable stacks
Linux LKM Rootkits
Windows Kernel Rootkits
Reverse engineering trai... [Read More]

CEH - Online

School/Trainer: Intense School
Atlanta, Chicago, Cleveland, Dallas, Las Vegas, New York City, Orlando, Seattle, Washington DC, United States
  V

Our most popular Ethical Hacking course is now available in an online format! Rest assured, we have made every effort to replicate the same training experience you would receive in our Instructor-Led Ethical Hacking course. Many online or CBT training offerings are simply a recording of a talking head. Intense School&,#146,s Hacker Training Online includes a shipment of software that is loaded onto your computer, which allows you to complete over 30 hours of hands-on lab exercises!

Not only do you get high quality instruction from an expert instructor, with Intense School, you also perform hands-on lab exercises that allow for real knowledge transfer:
You get exactly the same highly technical content in InfoSec Institute&,#146,s Ethical Hacking- Security Testing for Professionals course
All online hacker training lectures are delivered by an expert instructor.
Over 55 hours of live recorded streaming video.
All 27 Hands-On Lab exercises are included for you to work on at your home or work computer. These are the same lab exercises as the instructor-led class.
Certified Ethical Hacker Instructor-Led Review and Custom Review Questions included
CPT and CEH vouchers can be included - good at any 3500 Prometric testing centers world-wide.

The Hacker Training Online goes in-depth into the techniques used by m... [Read More]

CEH - Online

School/Trainer: JAGSAR International
Hyderabad, India
  V

The certified ethical hacker is a hacker certified in the field of ethical or positive hacking. Hacking is a term normally taken to be of negative nature but ethical hacking on the other hand is one such method which involves hacking to counter hackers. The course is certified by EC-Council. The certification provides ethical hackers to hack scan and test in their company or organizations network structure in order to provide for a better network security system. This course in particular provides you a practical environment to simulate the test and assess the loopholes of the organisation.

It is based upon:
•What is Ethical Hacking?
•How to perform it without any data theft and data loss?
•From scanning networks to penetration testing, each and every minor topic is taught.
•Professionally breaking into network systems of company, owners.
•Evaluation of the loopholes seen in the simulated tests.
•Course gives you exposure in professional and legal aspects of Ethical hacking.

The eligibility criterion is based on the background of a person, whether he is a non-technical, semi-technical or a technical. The course content is based on the above said basis. It is designed for computer network security experts and even for a beginner. Some of the organisations who intake the applicants often prefer candidates having extra ... [Read More]

CHFI - Online

School/Trainer: JAGSAR International
Hyderabad, India
  V

Computer hacking forensic investigation is the course of detecting hacking attacks and properly extracting evidence to report the crime and take measures to prevent similar future activities. Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may vary from tracing the tracks of a hacker through a client’s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will provide participants the necessary skills to identify a cybercriminals footprint and to properly gather the necessary evidence to prosecute before the judge in the court of law. URSE OUTLINEIt is based upon: It is based upon:
•It teaches the participant the methods to use the mistakes committed by the cybercriminal and to exploit it to the best in interest of the case.
•It imparts the necessary skills for steganalysis.
•How to recover deleted files?
•It teaches log management.
•Most importantly it ensures forensic investigation to be well taught.
•Digital evidence and password cracking concepts.

Ethical Hacking - Online

School/Trainer: Lewis University
Albuquerque, Chicago, Oak Brook, Romeoville, United States
  V

This course provides the student with theory and experience associated with ethical hacking - the practice of using the same skills employed by hackers with malicious intent to improve organizational information security. The successful protection of digital assets of an organization requires solid understanding of such techniques used by hackers to be better prepared against those kinds of attacks. Ethical hacking also requires performing a risk analysis for the particular organization as well as identifying the data, network and policy vulnerabilities. Firewalls and intrusion detection systems are examined from an ethical hacking perspective with focus on protecting digital assets.

EC-Council Certified Ethical Hacking and Countermeasures (CEH) - Online

School/Trainer: ProTech Professional Technical Services, Inc.
Columbia, Columbus, Kansas City, Oklahoma City, Omaha, Pittsburgh, Sacramento, San Francisco, Tulsa, United States
  V

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Duration:
5 Days/Lecture &, Lab

Audience:
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Topics:

Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
System Hacking
Trojans and Backdoors
Viruses and Worms
Sniffers
Social Engineering
Denial of Service
Read More]

Computer Hacking Forensic Investigator v8 - Online

School/Trainer: ProTech Professional Technical Services, Inc.
Columbia, Columbus, Kansas City, Oklahoma City, Omaha, Pittsburgh, Sacramento, San Francisco, Tulsa, United States
  V

Computer forensics enables the systematic and careful identification of evidence in computer related crime and abuse cases. This may range from tracing the tracks of a hacker through a client&,#146,s systems, to tracing the originator of defamatory emails, to recovering signs of fraud. The CHFI course will give participants the necessary skills to identify an intruder&,#146,s footprints and to properly gather the necessary evidence to prosecute. Many of today&,#146,s top tools of the forensic trade will be taught during this course, including software, hardware and specialized techniques. The need for businesses to become more efficient and integrated with one another, as well as the home user, has given way to a new type of criminal, the &,quot,cyber-criminal.&,quot, It is no longer a matter of &,quot,will your organization be comprised (hacked)?&,quot, but, rather, &,quot,when?&,quot, Today&,#146,s battles between corporations, governments, and countries are no longer fought only in the typical arenas of boardrooms or battlefields using physical force. Now the battlefield starts in the technical realm, which ties into most every facet of modern day life. If you or your organization requires the knowledge or skills to identify, track, and prosecute the cybercriminal, then this is the course for you. The CHFI is a very advanced security-t... [Read More]

Ethical Hacking and Countermeasures - Online

School/Trainer: UNDP
Ikeja, Nigeria

Ethical Hacking and Countermeasures

certified ethical hacker v7 - Online

School/Trainer: Zybeak Technologies
Chennai, India
  V

Greetings!!!!

Thank you for enquiring with our courses.


Become a Certified Ethical Hacker !!!!!

The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.

EXAM Information :
Students will be prepared for EC-Council’s CEH Exam and certification is awarded after successfully passing the exam.

TRAINING DETAILS :

Course Duration: 45 Hours
Course Fee: Rs. 25,000/- ( Incl. of Certification Cost)
Course Timings: Weekdays & Weekends
EC Council’s Courseware, EC Council Certification is provided

Ethical Hacking - Online

School/Trainer: Toluwani Institute of Information Security
Mumbai, India

* Ethical Hacking
* Networking
* Database Management
* Penetration Testing
* Forensics
* Data Recovery
* Website Development
* Linux
* Compliance
* Programming Languages
Java,
C
C++
HTML
.Net Technologies
PHP

Hacking Defenses - Online

School/Trainer: Central Penn College
Summerdale, Harrisburg, Lancaster, Bethlehem, United States
  V

This course examines the tools and techniques for protecting systems against hacking attacks. Multifunctional tools such as Netcat, the X Windows Operating system and Cygwin are examined. Port scanners and auditing tools are used to audit systems on the network, while port redirection, port sniffers, and wireless tools are used to audit the network itself. Tools used in forensics and incident response will be introduced.

Greyhat Hacking & Countermeasures - Online

School/Trainer: HCF Infosec Limited
Noida, India

It is a 32 Hours training courses conducted by Renowed IT Security professionals of HCF Infosec Limited. 30 Topics will be covered during the training program. Training kit include a certificate+pack of 6 Dvd’,s+ Study material(2 books).

Ankit Fadia Ethical Hacking - Online

School/Trainer: Reliance Web World
Coimbatore, India
  V

Learn the Latest computer security tools & techniques of Ethical hacking from the World-renowned computer security Guru, Ankit Fadia, and open a world of career opportunities for yourself.
Program Highlights:
- 4 hours of live Video conference with Ankit Fadia
- 21 hours of self-paced video-on-Demand learning
- online discussions to clarify doubts
- lab sessions & homework designed by Ankit Fadia & more!!!

Pages: 1 2 3


Find more about Hacking training courses, certificates, diplomas and degrees:





Tips:
Besides Acquiring latest course information by the search form, Students can also leave their study interests here and let schools callback.



- Other Topics -
Ask for Training
Add Courses