fbpx
Loading Events

« All Events

  • This event has passed.

EC-Council – Ethical Hacking Attack Phases Workshop

September 1 @ 8:00 am - 5:00 pm CDT

Who Should Attend?

IT Admins who are interested in cybersecurity, Ethical Hackers, Pen Testers

Workshop Overview

In this workshop you will learn system hacking, following this you will learn how to hack and assess web applications. Once you have practices these hacks, you will learn attacks that target wireless devices as well as mobile devices. You will be introduced to techniques to identify the attack surface and then the vectors for attack depending on the device(s) encountered.


Session One

Session One: System Hacking

    • Overview of CEH Hacking Methodology
    • Understanding Techniques to Gain Access to the System
    • Understanding Privilege Escalation Techniques
    • Understanding Techniques to Create and Maintain Remote Access to the System
    • Overview of Different Types of Rootkits
    • Overview of Steganography and Steganalysis Techniques
    • Understanding Techniques to Hide the Evidence of Compromise
    • Overview of System Hacking Penetration Testing

 



Session Two

Session Two: Hacking Web Applications

    • Understanding Web Application Threats
    • Understanding Web Application Hacking Methodology
    • Web Application Hacking Tools
    • Web Application Security Tools
    • Overview of Web Application Penetration Testing


    Session Three

    Session Three: Hacking Wireless Networks

          • Understanding Wireless Encryption Algorithms
          • Understanding Wireless Threats
          • Understanding Wireless Hacking Methodology
          • Wireless Hacking Tools
          • Understanding Bluetooth Hacking Techniques
          • Wireless Security Tools
          • Overview of Wireless Penetration Testing

     



    Session Four

    Session Four: Hacking Mobile Platforms

          • Understanding Mobile Platform Attack Vectors
          • Understanding various Android Threats and Attacks
          • Understanding various iOS Threats and Attacks
          • Mobile Security Guidelines and Security Tools
          • Overview of Mobile Penetration Testing



    Kevin King


    After studying at New Mexico Tech in the mid 90s, Kevin came into the tech world as a technical instructor for New Horizons Computer Learning Centers. Throughout his illustrious teaching career, Kevin has taught thousands of students in universities as well as major corporations through Instructor-led in-person and live, online delivery. He has held many certifications including CCENT, CCNA, CCNA Data Center, CCSI, MCT, MCSE, MCSE Private Cloud, MCSA. He has completed projects with companies from Baxter Healthcare and Charles Schwab to small Internet Startups and small businesses.
    Since joining EC-Council in the Spring of 2017 Kevin has become a Certified EC-Council Instructor (CEI) and has earned his certifications in the Certified Ethical Hacking (CEH), Certified Network Defender (CND), EC-Council Certified Security Analyst courses and has delivered dozens of these courses including EC-Council’s Mobile Security Tool Kit workshops at a plethora of third-party cons.

    What is Exploit Spokane?

    Please join us for ExploitCon Spokane, a local, exclusive one-day conference focused on providing the latest and greatest on cybersecurity. At this event enjoy presentations from a wide range of speakers, interactive villages to test your skills, connect with peers and other industry experts.

    Course will be ran virtual in conjunction with the ExploitCon Spokane.

    Attendees of the workshop will receive a free pass to the conference.

    To register for this course, click Buy Now,
    if you are interested but still have questions, click Contact Us.

    Interested but still have questions?

    Share this!
    Facebooktwitterredditpinterestlinkedinmail

    Details

    Date:
    September 1
    Time:
    8:00 am - 5:00 pm CDT
    Event Categories:
    ,