Banner Image

أمن المعلومات السيبراني

تكلفـة البرنامج التدريبي:

‏14,000.00 د.إ.‏

وصف البرنامج التدريبي:

This course is designed to provide employees with the knowledge and skills needed to identify vulnerabilities in systems and protect against cyber threats.

خيارات إضافية:

مكان الانعقاد

دبي

بداية البرنامج

12 أكتوبر 2025

نهاية البرنامج

16 أكتوبر 2025

عدد الأيام

5

الأهداف

Understand the role and responsibilities of an ethical hacker.

Learn how to perform vulnerability assessments and penetration testing.

Gain knowledge of common hacking techniques and how to defend against them.

Develop skills to secure networks, systems, and applications.

Familiarize with ethical hacking tools and methodologies.

Learn how to detect, prevent, and respond to security breaches.

Gain the expertise to prepare for the Certified Ethical Hacker (CEH) certification exam.

Understand the legal and ethical implications of hacking.

المحتوى

Introduction to Ethical Hacking

o Definition of ethical hacking and its significance.
o Key principles of ethical hacking.
o Differences between ethical hackers and malicious hackers.
o Legal and ethical considerations in ethical hacking.

Footprinting and Reconnaissance

o Understanding footprinting and its types (active and passive).
o Techniques for gathering information about a target.
o Tools used for reconnaissance (WHOIS, DNS, etc.
).
o Analyzing information to identify network vulnerabilities.

Scanning Networks

o Importance of network scanning in ethical hacking.
o Tools for network scanning (Nmap, Netcat).
o Identifying live hosts, open ports, and services.
o Understanding the concepts of vulnerability scanning and analysis.

Scanning Networks

o Importance of network scanning in ethical hacking.
o Tools for network scanning (Nmap, Netcat).
o Identifying live hosts, open ports, and services.
o Understanding the concepts of vulnerability scanning and analysis.

Enumeration

o Techniques for enumerating networks and systems.
o Gathering information about users, groups, and shared resources.
o Using tools like SNMP, SMB, and NetBIOS for enumeration.
o How enumeration helps in identifying weaknesses in a network.

System Hacking

o Techniques used to gain unauthorized access to systems.
o Password cracking techniques and tools.
o Elevating privileges in compromised systems.
o Maintaining access to a system and covering tracks.

Malware Threats and Security

o Types of malware (viruses, worms, Trojans, etc.
).
o Techniques for detecting and analyzing malware.
o Malware propagation and control methods.
o Countermeasures to prevent malware attacks.

Sniffing and Social Engineering

o Understanding network sniffing and how it works.
o Tools used for packet sniffing and analysis.
o Introduction to social engineering and psychological manipulation.
o Methods for defending against social engineering attacks.

Denial of Service (DoS) and Distributed DoS (DDoS) Attacks

o Overview of DoS and DDoS attacks and their impact.
o Techniques for launching DoS and DDoS attacks.
o How to defend against DoS and DDoS threats.
o Tools and strategies for mitigating the effects of DDoS attacks.

Web Application Security

o Common web application vulnerabilities (SQL injection, XSS).
o Techniques for attacking and exploiting web applications.
o Tools used for web application testing (Burp Suite, OWASP ZAP).
o Defending web applications from security breaches.

Wireless Network Security

• Vulnerabilities in wireless networks (WEP, WPA, WPA2).
• Attacks on wireless networks and how to perform penetration testing.
• Securing wireless networks through encryption and other methods.
• Best practices for wireless network security.

Cryptography

• Introduction to cryptography and its importance in security.
• Types of cryptographic algorithms (symmetric, asymmetric).
• Tools for encrypting and decrypting data.
• Using cryptography to protect sensitive information.

Ethical Hacking and Legal Issues

• Legal and ethical issues surrounding hacking and penetration testing.
• Understanding the laws governing ethical hacking.
• Importance of consent and authorization in penetration testing.
• Reporting vulnerabilities ethically and responsibly.

الشهادة

 AL manhal institue - course certificate

عند إكمال الحضور الكامل لهذه الدورة التدريبية، يحصل المشاركون على شهادة معتمدة صادرة من معهد المنهل المرخص من مركز أبوظبي للتعليم والتدريب التقني والمهني ، هذه الشهادة تحظى باعتراف إقليمي، مما يمنح حامليها ميزة تنافسية سواء داخل مؤسساتهم أو عند البحث عن فرص مهنية جديدة.