Category

CEH (v10)- Certified Ethical Hacker

Master advanced network packet analysis and system penetration testing techniques in this Certified Ethical Hacking (CEH) course aligned with the latest version of CEH (v10) by the EC-Council. Hands-on experience in advanced hacking techniques equips you with the knowledge and foresight to fortify your system network security.    Key Features...
-
+
$2,899.00

Deviare

LVC

2837

Master advanced network packet analysis and system penetration testing techniques in this Certified Ethical Hacking (CEH) course aligned with the latest version of CEH (v10) by the EC-Council. Hands-on experience in advanced hacking techniques equips you with the knowledge and foresight to fortify your system network security. 

 

Key Features

  • 40 hours of blended learning
  • Accredited training partner of EC-Council
  • 6 months free access to CEHv10 iLabs
  • Study material by EC-Council (e-kit)
  • 20 current security domains
  • Covers 340 attack technologies

Key Learning Outcomes:

  • Grasp the step-by-step methodology and tactics that hackers use to penetrate network systems
  • Understand the finer nuances of trojans, backdoors, and countermeasures
  • Get a better understanding of IDS, firewalls, honeypots, and wireless hacking
  • Master advanced hacking concepts, including mobile device and smartphone hacking, writing virus codes, exploit writing and reverse engineering, and corporate espionage
  • Gain expertise on advanced concepts such as advanced network packet analysis, securing IIS and Apache web servers, Windows system administration using Powershell, and hacking SQL and Oracle databases
  • Cover the latest developments in mobile and web technologies, including Android, iOS, BlackBerry, Windows Phone, and HTML 5
  • Learn advanced log management for information assurance and manage information security with more clarity

Course Outline
  • Module 01- Introduction to Ethical Hacking
  • Module 02- Footprinting and Reconnaissance
  • Module 03- Scanning Networks
  • Module 04- Enumeration
  • Module 05- Vulnerability Analysis
  • Module 06- System Hacking
  • Module 07- Malware Threats
  • Module 08- Sniffing
  • Module 09- Social Engineering
  • Module 10- Denial-of-Service
  • Module 11- Session Hijacking
  • Module 12 - Evading IDS, Firewalls, and Honeypots
  • Module 13- Hacking Web Servers
  • Module 14- Hacking Web Applications
  • Module 15- SQL Injection
  • Module 16- Hacking Wireless Networks
  • Module 17- Hacking Mobile Platforms
  • Module 18- IoT Hacking
  • Module 19- Cloud Computing
  • Module 20- Cryptography

Eligibility

This ethical hacking course is for network security officers and practitioners, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, technical support engineers, senior systems engineers, and systems analysts.

Prerequisites


There is no specific eligibility criteria for Certified Ethical Hacker (CEH) training and certification, but we recommend a basic knowledge of TCP/IP

Recently Viewed Products