Penetration Test

Hack your own Web Application.

Course Description

This Course is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors, and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks, and security measures. Unlike other strictly theoretical training, you will be immersed in interactive sessions with hands-on labs after each topic. You can explore your newly gained knowledge right away in your classroom by pentesting, hacking and securing your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current, essential security systems. You will first begin with understanding how perimeter defenses work and then move into scanning and attacking networks, of course, no real network is harmed. You will also learn how intruders escalate privileges and what steps can be taken to secure a system. You will also gain knowledge about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation.

What will you learn?

Students going through Manuel Corbelle training will learn:

1. Key issues plaguing the information security world, incident management process, and penetration testing

2. Various types of footprinting, footprinting tools, and countermeasures

3. Network scanning techniques and scanning countermeasures

4. Enumeration techniques and enumeration countermeasures

5. System hacking methodology, steganography, steganalysis attacks, and covering tracks

6. Different types of Trojans, Trojan analysis, and Trojan countermeasures

7. Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures

8. Packet sniffing techniques and how to defend against sniffing

9. Social Engineering techniques, identify theft, and social engineering countermeasures

10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures

11. Session hijacking techniques and countermeasures

12. Different types of webserver attacks, attack methodology, and countermeasures

Any doubts?

Can I spy my ex? No!

Can I insert a trojan in my boss computer? No!

Can I use my neighbor's Wi-Fi without permission? No!

Legal Agreement

Ethical Hacking and Countermeasures course mission is to educate, introduce and demonstrate hacking tools for penetration testing purposes only. Prior to attending this course, you will be asked to sign an agreement stating that you will not use the newly acquired skills for illegal or malicious attacks and you will not use such tools in an attempt to compromise any computer system, and to indemnify EC-Council with respect to the use or misuse of these tools, regardless of intent.


Not anyone can be a student - the Accredited Training Centers (ATC) will make sure the applicants work for legitimate companies.

PhD Manuel Corbelle is always watching!!