Overview
Overview
Thank you for reading this post, don't forget to subscribe!This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.
In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.
In addition to learning how to scan, test, hack, and secure a system, you’ll prepare for the latest Certified Ethical Hacker exam from EC-Council. An exam voucher is included with your course registration; however, the exam will not be administered in class to allow for maximum discussion opportunities and hands-on activities.
Highlights of CEH v9 include understanding the five phases of ethical hacking:
- Reconnaissance
- Gaining Access
- Enumeration
- Maintaining Access
- Covering Your Tracks
Audience Profile
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Prerequisites
- At least two years of IT security experience
- A strong working knowledge of TCP/IP
Objectives
Course Objectives
- Footprinting
- Network scanning
- Enumeration
- Packet sniffing
- Social Engineering
- DoS/DDoS
- Session hijacking
- Webserver and web application attacks and countermeasures
- SQL injection attacks
- Wireless encryption
- Cloud computing threats
- Cryptography ciphers
- Penetration testing