Certified Ethical Hacker, Part 3 of 8: Threats and System Hacking

with expert Rafiq Wayani

This course narrows in on how to identify threats both external and internal. Perhaps one of the employees of the business uses a very weak password and this is a security threat that a dictionary attack tool can rapidly find. It then covers how to gain information or "footprinting" on a target of ethical hacking. It shows how to scan and also to mitigate scans to acquire information about weak points and then explains diagramming your system from a hacking perspective. This course is part of a series covering EC-Council's Certified Ethical Hacker (CEH).


Intermediate | 1h 40m | December 16, 2015

Ethical HackingSecurity

Course Outline


Rafiq Wayani

Rafiq Wayani has extensive experience including more than 20 years in IT as Systems Architect, Software Engineer, DBA, and Project Manager. Wayani has instructed in a variety of technical areas, has designed and implemented network and information systems, and is certified across a wide range of platforms and systems including Microsoft Solutions Developer, Systems Engineer, Application Developer, Database Administrator, Trainer; Novell Netware Administrator and Engineer; Master Certified Netware Engineer; and A Certified.




Explore Our Blogs, Courses and Webinars