Certified Ethical Hacking (CEH)
Course Description
This is the world’s most advanced certified ethical hacking course with 20 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organisation. In 20 comprehensive modules, the course covers 340 attack technologies, commonly used by hackers.
Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in.
Course Structure
This course is split into the following modules
- Module 01: Intro to Ethical Hacking
- Module 02: Reconnaissance
- Module 03: Scanning Networks
- Module 04: Enumeration
- Module 05: Vulnerability Analysis
- Module 06: System Hacking
- Module 07: Malware Threats
- Module 08: Sniffing
- Module 09: Social Engineering
- Module 10: Denial-of-Service
- Module 11: Session Hijacking
- Module 12: Evading IDS, Firewalls, and Honeypots
- Module 13: Hacking Web Servers
- Module 14: Hacking Web Applications
- Module 15: SQL Injection
- Module 16: Hacking Wireless Networks
- Module 17: Hacking Mobile Platforms
- Module 18: IoT Hacking
- Module 19: Cloud Computing
- Module 20: Cryptography
Should Attend
This course is ideal for information security: Analysts/Administrators, Managers/Specialists, Professionals/Officers, IT Auditors
Also for current Information: Systems Security Engineers/Managers, Assurance (IA) Security Officer
Additionally, if you are a: Risk/Threat/Vulnerability Analyst, Network Administrator or Engineer
Prerequisites
All delegates must have strong TCP/IP networking skills, equivalent of CompTIA Network+. All delegate must have strong IT Systems administration experience, equivalent of CompTIA A+ and CompTIA Server+. It is recommended that delegates have fundamental security experience, equivalent of ISC2 CISSP programme
Assessment
At the end of the course you will seat for an exam. The exam fee is included in the price.
Key-Features
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!
Course Structure
This course is split into the following modules
- Module 01: Intro to Ethical Hacking
- Module 02: Reconnaissance
- Module 03: Scanning Networks
- Module 04: Enumeration
- Module 05: Vulnerability Analysis
- Module 06: System Hacking
- Module 07: Malware Threats
- Module 08: Sniffing
- Module 09: Social Engineering
- Module 10: Denial-of-Service
- Module 11: Session Hijacking
- Module 12: Evading IDS, Firewalls, and Honeypots
- Module 13: Hacking Web Servers
- Module 14: Hacking Web Applications
- Module 15: SQL Injection
- Module 16: Hacking Wireless Networks
- Module 17: Hacking Mobile Platforms
- Module 18: IoT Hacking
- Module 19: Cloud Computing
- Module 20: Cryptography
Should Attend
This course is ideal for information security: Analysts/Administrators, Managers/Specialists, Professionals/Officers, IT Auditors
Also for current Information: Systems Security Engineers/Managers, Assurance (IA) Security Officer
Additionally, if you are a: Risk/Threat/Vulnerability Analyst, Network Administrator or Engineer
Prerequisites
All delegates must have strong TCP/IP networking skills, equivalent of CompTIA Network+. All delegate must have strong IT Systems administration experience, equivalent of CompTIA A+ and CompTIA Server+. It is recommended that delegates have fundamental security experience, equivalent of ISC2 CISSP programme
Assessment
At the end of the course you will seat for an exam. The exam fee is included in the price.
Key-Features
The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification!
Register Your Interest: