Certified Ethical Hacker

CEH

Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

Who is a Certified Ethical Hacker?

A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases and other critical data on secured systems. A CEH understands attack strategies, the use of creative attack vectors and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.

Who must take this course?

You must take this course if you are working as; Information Security Analyst/Administrator,Information Assurance Security Officer, Information Security Manager, Information Systems Security Engineer, Information Security Professional, Information Security Auditor, Risk/Threat/Vulnerability Analyst, System Administrator, Network Administrator and Engineer

 

Course Modules include;

  • Introduction to Ethical Hacking
  • Foot-printing and reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Evading IDS, Firewalls and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography