• expired

FREE Webinar Short Course: Ethical Hacking (Charles Sturt University)

580

Covers everything from scanning networks, to hacking, to trojans and viruses. The demos sound fascinating as well. Enjoy.

The short course will be run over 5 weeks with lectures being delivered via weekly after hours Webinars (recordings of the Webinar will be available if you are unable to make the live event). In between the Webinars, you will be asked to do 10-12 hours of study.

Course Schedule:

Week 1: 28th May – 3rd June

Module 1: Introduction to Ethical Hacking
Module 2: Footprinting and Reconnaissance
Demo: How do hackers “hack”?

Webinar: 7:00 – 9:00pm, Wednesday 28th May AEST (Australian Eastern Standard Time UTC +10)

Week 2: 4th – 10th June

Module 3: Scanning Networks
Module 4: Enumeration
Demo: U w1ll 0w3n T3hm 500n

Webinar: 7:00 – 9:00pm, Wednesday 4th June AEST (Australian Eastern Standard Time UTC +10)

Week 3: 11th – 17th June

Module 5: System Hacking
Module 6: Trojans and Backdoors
Module 7: Viruses and Worms
Demo: See how Malware infects our systems!

Webinar: 7:00 – 9:00pm, Wednesday 11th June AEST (Australian Eastern Standard Time UTC +10)

Week 4: 18th – 24th June

Module 8: Penetration Testing
Demo: What Pen Testers do to fight back against bad guys!
Exam Review

Webinar: 7:00 – 9:00pm, Wednesday 18th June AEST (Australian Eastern Standard Time UTC +10)

Week 5: 25th June – 1st July

Online test. A free, open-book test.

Students will have the opportunity to sit this timed (1 hour) test once within the exam week, at any time that suits them. Those who pass the test will be awarded a certificate of achievement from IT Masters & Charles Sturt University.

Course Information Q&A

Question 1: Who is the target audience for this course?

The course is aimed at System Administrators, Network Administrators and anyone who is interested in network security technologies.

Question 2: Will there be live lectures?

Yes – There will be weekly live Lectures/Tutorials delivered via Webinars. Recordings of the Webinars will be available if you are unable to make the live events.

Question 3: Who will be presenting the Webinars?

The Webinars will be presented by one of the world’s most popular & motivational Cyber Security presenters – Erdal Ozkaya. Erdal’s awards and speaking engagements include:

2011 : EC-Council (Global) Instructor of the year
2012 : Microsoft Most Valuable Professional – Windows Expert : IT Pro
2012 : EC-Council Roll of Honour CEH, CHFI, ENSA, ECSA
2012 : EC-Council (Global) Instructor of the year (Circle of Excellence) -Partner of the year
2013 : Microsoft Most Valuable Professional – Windows Expert : IT Pro
Microsoft TechEd Australia 2013
Microsoft TechEd Europe 2013
Microsoft TechEd North America 2013
AusCERT Australia 2012
Australian Information Security Association National Conference (AISA) 2010
Question 4: Will I be able to ask questions?

Yes – You will be able to ask questions during the Webinars and also at any time during the course on the online question Forum.

Question 5: Is there a final exam?

Yes – There will be an exam at the end of the course. The exam is a timed open book exam that will sit at your computer.

Question 6: Do I get a certificate if I complete the course?

Yes – Those who pass the exam during the official sitting period will receive a Certificate of Completion.

Question 7: Will the course qualify me for university credit?

Completion of the course will not qualify for credit, however the content does cover sections of the subject ITE516 Hacking Countermeasures. This short course will prepare you well should you choose to continue to studying with Charles Sturt University. To find out how much credit you would qualify for, fill out the Eligibility form at http://www.itmasters.edu.au/am-i-eligible/

Related Stores

IT Masters
IT Masters

closed Comments

  • +3

    Thanks TA, it is nice to learn new things, especially for free, registered.

  • +3

    How to be a haxor:
    Step 1. Download LOIC.
    Step 2. Use Domain Tools to find the IPs of sites you don't particularly like.
    Step 3. IMMA CHARGIN MAH LAZER.
    Step 4. ????
    Step 5. Cease & Desist/Lawsuits/ISP disconnection/Knock-Knock it's teh MAFIAA/Don't drop the soap.

    • In other words, a skid (script kiddie/skiddie)

  • what's considered as "ethical hacking" ?

    • +3

      Pen-testing a.k.a. Penetration Testing. No, not the kind of "penetration testing" we're all too familiar with.

      • +1

        the later is what unethical hackers discover after being caught.

        • +1

          I think that's a uniquely American phenomenon.

  • +1

    Erdal is an awesome guy. Very engaging teacher.. & has PLENTY of good stories :)

  • This course was supposed be scheduled in April, but it was cancelled.
    Hopefully this goes ahead as it sounds interesting.

  • +1

    Perfect, this is what i call a DEAL.

    Thanks matey

  • Hi guys , how do I register with this free webinar course ?

Login or Join to leave a comment