top of page

Length of Program: 11-12 months (945 hours) - Credential: Certificate

Program Description:

This program prepares students with the knowledge, skills, and practice to function as a security specialist in networking in computing with an Ethical Hacker perspective. Concentration courses are based on the standards and objectives of the industry, as well as being oriented towards validation of knowledge of skills through obtaining their certifications. Upon completion of the program, students will have the skills and knowledge necessary to obtain an industry recognized certification. The program will include the skills of promoting professional and ethical principles, including professional and individual effectiveness skills as a key part of our vision of the new professional through our course Development of Professional and Personal Effectiveness.


General Objective:


Develop in students the skills and experience needed to analyze, develop, implement and evaluate network security in computer systems. Also, information systems insurance designs per the needs of the customer or the company. The overall aim is to develop a technical consultant in computer networks and computer systems specialist in computer security.


Specific Objectives:


At the end of the course, the student will demonstrate knowledge and skills in:


  1. Introduction to Ethical Hacking and the importance in our digital world.

  2. Foot printing and Reconnaissance in the client environment.

  3. The use of different types of scanning methodologies and tools.

  4. Scanning networks, methodologies, draw networks diagrams and configure proxies.

  5. Enumeration concepts and techniques, and enumeration countermeasures.

  6. System hacking methodologies, password cracking, escalating privileges, types of key loggers, types of Spyware, and types of Rootkits and how to detect them.

  7. Trojans and Backdoors concepts, detection, and countermeasures.

  8. Viruses and Worms concepts and types, malware analysis, penetration testing for Viruses.

  9. Sniffers fundamentals, MAC and DHCP Attacks, ARP and DNS Poisoning, Spoofing Attacks, Sniffing Tools, Countermeasures and Sniffing Pen Testing.

  10. Social Engineering Fundamentals and Techniques, Impersonation on social networking sites, and identity theft.

  11. Denial of Service Concepts and Countermeasures.

  12. Session Hijacking Concepts, Session Hijacking Tools, and Countermeasures.

  13. Hijacking Webservers and Attacks Tools, Countermeasures, Patch Management and Webserver Security Tools.

  14. Hijacking Web Applications, Web App Threats, Web App Hacking Methodology, and Web App Pen Testing.

  15. SQL Injection and Types, Testing for SQL Injection and Countermeasures.

  16. Hacking Wireless Networks Concepts and Types, Wireless Encryption, Wireless Threats, Wireless Hacking Methodology, Man-in-the-Middle Attack, Countermeasures and Wireless Security Tools.

  17. Hacking Mobile Platforms including Android OS, iOS, Windows Phone OS, BlackBerry, Mobile Security Guidelines and Tools.

  18. Evading IDS, Firewalls and Honeypots, Countermeasures and Penetration Testing.

  19. Buffer Overflow Concepts, Examples, Methodologies, Detection and Countermeasures, Security Tools and Penetration Testing.

  20. Cryptography Fundamentals, Encryption Algorithms, Cryptography Tools, Public Key Infrastructure (PKI).

  21. Penetration Testing Types and Concepts, Phases, Techniques, and Pen Testing Roadmap.

bottom of page