A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective

Ideal Candidate

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

About the training

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation

Course Duration

80 Hrs

Course Outline

    Module 01: Introduction to Ethical Hacking

    Module 02: Foot printing and Reconnaissance

    Module 03: Scanning Networks

    Module 04: Enumeration

    Module 05: Vulnerability Analysis

    Module 06: System Hacking

    Module 07: Malware Threats

    Module 08: Sniffing

    Module 09: Social Engineering

    Module 10: Denial-of-Service

    Module 11: Session Hijacking

    Module 12: Evading IDS, Firewalls, and Honeypots

    Module 13: Hacking Web Servers

    Module 14: Hacking Web Applications

    Module 15: SQL Injection

    Module 16: Hacking Wireless Networks

    Module 17: Hacking Mobile Platforms

    Module 18: IoT Hacking

    Module 19: Cloud Computing

    Module 20: Cryptography

Related Trainings

courch-img
images

Course Details

This certification validates that you have the skills needed to run a highly efficient and modern data center, with expertise in cloud technologies, identity management, systems management, virtualization,

Read More
courch-img
images

Course Details

Microsoft Certified Solutions Associate is intended for people who seek entry-level jobs in an information technology environment,

Read More
courch-img
images

Course Details

Microsoft Certified Solutions Associate is intended for people who seek entry-level jobs in an information technology environment,

Read More
courch-img
images

Course Details

As Enterprises migrate toward controller based architectures, the role and skills required of a core network engineer are evolving and more vital than ever.To prepare for this network transition, ,

Read More
courch-img
images

Course Details

Cisco Certified Network Professional Routing and Switching certification validates the ability to plan, implement, verify and troubleshoot local and wide-area enterprise networks,

Read More
courch-img

CCNA :Security                                  

 

images

Course Details

Cisco Certified Network Associate Security (CCNA Security) validates associate-level knowledge and skills required to secure Cisco networks. With a CCNA Security certification,,

Read More
courch-img

CCNA :Collaboration                                  

 

images

Course Details

For network video engineers, IP telephony and IP network engineers who want to develop and advance their collaboration and video skills in line with the convergence of voice,

Read More
courch-img
images

Course Details

An IT professional who has earned the Red Hat Certified System Administrator (RHCSA®) is able to perform the core system administration skills required in Red Hat Enterprise Linux environments,

Read More
courch-img
images

Course Details

A Red Hat® Certified Engineer (RHCE®) is a Red Hat Certified System Administrator (RHCSA) who possesses the additional skills, knowledge, and abilities required of a senior system administrator,

Read More
courch-img
images

Course Details

Never learned Linux? Want a refresh? Take this course to learn the basics of this popular open source operating system,

Read More
courch-img
images

Course Details

This course is designed to introduce to the participants, the fundamentals of Network Storage technologies, focusing on Storage Area Networks (SAN) and Network Attached Storage (NAS),

Read More
courch-img
images

Course Details

This course teaches IT Professionals how to manage their Azure subscriptions, create and scale virtual machines,

Read More
courch-img
images

Course Details

In this course, you will gain insights into Azure Security services to help secure your services and data within Azure

Read More
courch-img
images

Course Details

This Training is intended for individuals who perform a solutions architect role and have one or more years of hands-on experience designing available,

Read More
courch-img
images

Course Details

Achieving the Amazon Web Services (AWS) Security – Specialty certification enables tenured cloud security professional to demonstrate their ability to secure the AWS cloud

Read More