Ethical Hacking
COURSE DESCRIPTION
This training provides the foundational knowledge needed to ethically and effectively discover and exploit vulnerabilities in systems by assuming both the mindset and toolset of an attacker. Through learning how systems are attacked you will gain an understanding of how best to protect systems and improve your organization’s security.
CERTIFICATION
This training can be used to prepare for the EC-Council® CEH® (Certified Ethical Hacker) examination. Obtaining the CEH certification is the first step towards the Certified Network Defense Architect (CNDA™) certification.
LEARNING OUTCOMES
This course is for you, if you want to become:
✓Cyber-security Enthusiast
✓ Security Officer
✓ Security Auditor
✓ Security Professional
✓ Website Administrator or Webmaster
✓ Network Infrastructure Administrator
Course Content
Ethical Hacking: Understanding Ethical Hacking
-
The Truth About Living in a Technology Based World
-
Overview of the CEH Certification Program
-
How to Build a Lab to Hack Safely
-
Installing and Configuring Your Windows Server VMs
-
Installing and Configuring Your Desktop VMs
-
Information Security Overview
-
Security Threats and Attack Vectors
-
Hacking Concepts
-
Hacking Phases
-
Attack Types
-
Information Security Controls
-
How to Prepare for the Certified Ethical Hacker Exam
Ethical Hacking: Reconnaissance/Footprinting
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial of Services
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Server
Hacking Web Application
SQL Injections
Hacking Wireless networks
Hacking Mobile Plateform
Hacking The Internet Of Things (LOT)
Cloud Computing
Cryptography
Penetration Testing
About the instructor
16 Courses
0 students