CEH (Crtifide Ethical Hacker)IT Security / CEH (Crtifide Ethical Hacker)

  Start : September 19-2024
  End : September 22-2024
  Trainer : Eng.Saad hamad
  Course Fee : 0.00$
  No. Of Places : 4 Of 12
  Location : Apt #7 ,Floor 11, Tower 4, Empire Business Towers, Erbil, Kurdistan Region, Iraq.

CEH (Crtifide Ethical Hacker)
The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3 part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one!

who should attend?

 

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure..

 

objective

 

This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules,

the course covers over 270 attack technologies, commonly used by hackers.

Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

As “a picture tells a thousand words”, our developers have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 5 day hands on class by our Certified Instructor.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

In short, you walk out the door with hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification.

content

 

CEH consists of 18 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training

1. Introduction to Ethical Hacking

2. Footprinting and Reconnaissance

3. Scanning Networks

4. Enumeration

5. System Hacking

6. Malware Threats

7. Sniffing

8. Social Engineering

9. Denial of Service

10. Session Hijacking

11. Hacking Webservers

12. Hacking Web Applications

13. SQL Injection

14. Hacking Wireless Networks

15. Hacking Mobile Platforms

16. Evading IDS, Firewalls, and Honeypots

17. Cloud Computing

18. Cryptography

What will you learn?

Students going through CEH training will learn:

1.     Key issues plaguing the information security world, incident management process, and penetration testing.

2.     Various types of footprinting, footprinting tools, and countermeasures.

3.     Network scanning techniques and scanning countermeasures.

4.     Enumeration techniques and enumeration countermeasures.

5.     System hacking methodology, steganography, steganalysis attacks, and covering tracks.

6.     Different types of Trojans, Trojan analysis, and Trojan countermeasures.

7.     Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.

8.     Packet sniffing techniques and how to defend against sniffing.

9.     Social Engineering techniques, identify theft, and social engineering countermeasures.

10. DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.

11. Session hijacking techniques and countermeasures.

12. Different types of webserver attacks, attack methodology, and countermeasures.

13. Different types of web application attacks, web application hacking methodology, and countermeasures.

14. SQL injection attacks and injection detection tools.

15. Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools.

16. Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools

17. Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.

18. Various cloud computing concepts, threats, attacks, and security techniques and tools.

19. Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and crypt analysis tools

Various types of penetration testing, security audit, vulnerability assessment, and penetration testing road map.




how can we help you?

 

Apply Now

(Bachelor - Master - Doctorate )