![]() ![]() It also assumes that you have experience with managing a network, have worked with networking hardware such as switches & routers, are familiar with MS Active Directory (AD) Domain based authentication, know how to work with command-line utilities, and understand the basics of Web Server environments. To get the most out of this course, this course assumes that you have a good working knowledge of Linux and Windows based networking environments. There is a Post Exam for each Module that must be passed with a score of 70% or higher to successfully and fully complete the course. Within each module there are Topics (typically 15-30 minutes each) and Subtopics (typically 2-5 minutes each). This course is part of a series covering EC-Council's Certified Ethical Hacker (CEH).Įach LearnNowOnline training course is made up of Modules (typically an hour in length). How do you case an establishment and look for week points in the human element? And also how can you attempt to mitigate these threats. This is an area that social engineering can come into play. ![]() Perhaps a company is very good in network security but lacking in physical security. Also the human element of Ethical Hacking will be covered. Examples will be shown with Wireshark and how to interact with Packets. Learning about how each threat is different is key and about how to mitigate it. There are many different types of Malware from trojans and worms to viruses and backdoors. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |