InformIT Home About InformIT Oracle Workforce Development Program Cisco Networking Academy Program Microsoft IT Training & Certification Other Intensive Training International IT Certifications
CWNP Series
Network Security
  Intro. to Network Security  
  Ethical Hacker Program  
  Linux Fundamentals  
  Linux System Administration  
  Linux Internet Sys. Admin.  
Sun Java & J2EE
  Java Programming Language  
Web Design & Programming
  HTML 4.0 and CSS  
  Dreamweaver MX  
  Flash MX  
  PHP & MySQL  
Graphic Design
  AutoCad 2004  
  3D Studio MAX  
  Adobe Premier  
  C Programming  
  OOP with C++  
  SPSS Fundamentals  
  SPSS - Statistic Multivariate  
  Riset Pemasaran Dgn SPSS  
  Software Engineering  
  Crystal Reports 10  





This course provides you with the knowledge required to successfully implement an ethical hacking program and keep malicious hackers out of your business.

This intensive course include the following features :

  • Various technical and non-technical hack attacks and their detailed methodologies
  • Penetration tests with commercial, freeware, and open-source hack-attack tools
  • Specific countermeasures to protect against hack attacks
The lab-intensive environment gives you in-depth knowledge and practical experience with the current essential security systems.

Participants who complete this course will be able to identify threats against a network and plan perimeter defenses. Participants will also be ready for the prestigious Certified Ethical Hacker certification from EC-Council -- CEH Exam 312-50.


Course schedule

Duration: 5 days
To view the schedule for this class, click here.

Who should attend

This course is ideal for system or network administrator, security personnel, auditor, and everyone that's concerned with network and system security.


Students should be having basic computer administration & networking skills.

Course Outline

The in-depth course modules will provide you with the skill & knowhow related to the Certified Ethical Hacker objectives.

1: Ethics & Legal Issues
2: Discovering the Network
3: Network Mapping & Scanning
4: Host Mapping (Enumeration)
5: System Hacking
6: Buffer Overflows
7: Gaining Access : Trojans and Backdoors
8: Understanding Virus and Worms
9: Network Sniffers
10: Denial of Service Attacks
11: Social Engineering Threat
12: Man-in-the-middle Attacks
13: Attacking Web Servers
14: Uncovering Web Vulnerabilities
15: Web Based Password Cracking Methods
16: Cryptography Basics
17: SQL Injection
18: Wireless LAN Hacking
19: Linux Hacking
20: Counter-Attacks : IDS, Firewalls and Honeypots



INFORMIT - Skill Development Center
Jl. Purnawarman 9c, Bandung 40117- Phone (022) 4224 168 / 4223 168
Fax. (022) 4231 168 - E-mail:

  Home | About Us | Oracle | Cisco | Microsoft | Other Training | Certification | Training Calendar  
© 2006, InformIT Ganesa Pratama. All Right Reserved