Computer Hacker Professional Package

Provided by

  • Sector IT
  • Course Type Online
  • Duration 1 Year
  • Price £200

Enquire about this course

About the course

What can I use it for?

The Computer Hacker Professional Package is best utilised by you if you’re looking to move into an IT security role, it is also ideal for current IT Professionals (of any IT background) to build their knowledge and understanding of hacking techniques so you can better protect your resources. This Computer Hacker Professional Package is a combination of the most popular techniques used by real industry professionals worldwide.

The average salary for an IT Security Professionals with these qualifications is £50,000.

Course Units

Ethical Hacking & Countermeasures

  • Introduction
  • Footprinting & Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans & Backdoors
  • Viruses & Worms
  • Denial of Service
  • Social Engineering
  • Sniffers
  • Session Hijacking
  • Hacking Webservers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls & Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing

Cyber Forensic Investigator

  • Computer Forensics Introduction
  • Forensics Investigation Process
  • Searching and Seizing
  • Digital Evidence
  • First Responder Procedures
  • Forensics Lab
  • Hard Disks and File Systems
  • Windows Forensics
  • Data Acquisition and Duplication
  • Recovering Deleted Files and Partitions
  • Using Access Data FTK
  • Using EnCase
  • Steganography
  • Password Cracks
  • Log Correlation
  • Network Forensics
  • Wireless Attacks
  • Web Attacks
  • Email Crimes
  • Mobile Investigation
  • Investigative Reports
  • Expert Witness


  • Information Security Governance
  • Risk Management
  • Information Security Program
  • Information Security Program Implementation
  • Information Security Program Management
  • Incident Management and Response


  • Internal Control Classifications
  • IT Strategy
  • Information Systems Maintenance Practices
  • Media Disposal Process
  • How to Evaluate Service Level Management Practices
  • Network Security Devices and Network Components
  • Business Continuity and Disaster Recovery Regulations


  • Accounts and Identity Management
  • Technical Penetration Testing
  • Layers of Protection
  • Connectivity Interfaces and Applications
  • Digital Signature Overview
  • How to Apply Integrity Controls
  • Types of Encryption
  • Software OS and Design
  • Data Backup and Control
  • Policy and Program Management

Related article

Bag yourself a course this Black Friday