# Ethical Hacking Workshop

One Day workshop about Ethical Hacking and Information Security that will introduce a general background for students to know how to scan, test, hack and protect their own systems and gives each student in-depth knowledge and practical experience about the current essential security systems. It will also help them to understand how to secure and protect their networks.  
The goal of this course is to help participants to master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation and its techniques.  
This workshop is suitable for Network Engineers, Network Security Engineer, network administrators and for those who have strong interests in information security and hacking.

##### <span class="mw-headline" id="bkmrk-workshop-level-1">Workshop Level</span>

Intermediate Level

##### <span class="mw-headline" id="bkmrk-instructor-1">Instructor</span>

<div class="mw-content-ltr" dir="ltr" id="bkmrk-farah-almohager-moha" lang="en"><div class="mw-parser-output">- Farah almohager
- Mohaund Altayib

</div></div>##### <span class="mw-headline" id="bkmrk-requirements-1">Requirements</span>

<div class="mw-content-ltr" dir="ltr" id="bkmrk-participants-must-ha" lang="en"><div class="mw-parser-output">- Participants must have a good knowledge about networking and IP addressing; also know the basic commands of Linux and how to work in UNIX systems.
- Participants should bring a laptop computer to participate in the lab, with 4GB RAM as minimum.

</div></div>##### <span id="bkmrk-"></span><span class="mw-headline" id="bkmrk-date-%26-time-1">Date &amp; Time</span>

<div class="mw-content-ltr" dir="ltr" id="bkmrk-date%3A-saturday%2C-x.x." lang="en"><div class="mw-parser-output">- Date: Saturday, x.x.x
- Time: 9:30AM - 5:30PM

</div></div>##### <span class="mw-headline" id="bkmrk-outline-1">Outline</span>

<div class="mw-content-ltr" dir="ltr" id="bkmrk-introduction-che-foo" lang="en"><div class="mw-parser-output">- Introduction CHE
- Foot printing
- Scanning network
- Enumeration
- System hacking
- Social Networking
- Web hacking
- Metasploit
- Web application attack
- Kali installation and configuration network.

</div></div>##### <span class="mw-headline" id="bkmrk-registration-1">Registration</span>

\*Paste registration link here\*

<div class="catlinks" data-mw="interface" id="bkmrk--1"></div>