CEH® v10 (EC-Council Certified Ethical Hacker) SE-008

The Security training will be deliver by Kereon, our Accredited EC-Council partner.

Overview course

This training offers a quick but rigorous preparation to the Certified Ethical Hacker (CEH®) exam of the EC-Council. Participants will learn how to evaluate, test and penetrate their own systems. With the help of several practical exercises, they will acquire an in-depth knowledge of security systems. Participants will begin by learning how the perimeter defense works and will then learn how to attack in order to validate the security of their own networks without causing any real damage. The training allows participants to analyze the different steps involved in an intrusion, from recognition to privilege escalation, and to identify what steps should be taken to ensure the safety of their environments. Topics include intrusion detection, process creation, social engineering, DDoS attacks, buffer overflow and virus creation. When participants complete the 5-day training, they will have experienced the overall concept of ethical hacking.

Objectives
  • Acquire necessary knowledge to successfully obtain the CEH® certification
  • Master the knowledge and concepts of ethical hacking
  • Acquire a general understanding of environment-related attack types
  • Provide participants with a global vision of security risks to their systems and master counter-attack methods
Prerequistes
  • The CEH® candidate should possess at least two years of technical experience in information security and be endorsed by his employer
  • Good knowledge of TCP/IP
  • Good basic knowledge of Linux
Audience
  • Anyone wishing to obtain the CEH® certification and further their knowledge of ethical hacking
  • Information Systems Auditors
  • Information Security Team Members
  • Web Site Administrators
  • Expert Consultants in Information Technology
Syllabus

DAY 1

  • Module 0 – Introduction to EC-Council
  • Module 1 – Introduction to Ethical Hacking
  • Module 2 – Footprinting and recognition
  • Module 3 – Network Scanning
  • Module 4 – Systems Enumeration

DAY 2

  • Module 5 – Information Systems Hacking
  • Module 6 – Trojans Horses and Backdoors
  • Module 7 – Viruses and Worms
  • Module 8 – Sniffers

DAY 3

  • Module 9 – Social Engineering
  • Module 10 – Denial of Service Attacks (DoS)
  • Module 11 – Session Hacking (Hijacking)
  • Module 12 – Web Server Hijacking

DAY 4

  • Module 13 – Web Application Hacking
  • Module 14 – SQL Injection
  • Module 15 – Wireless Networks Hacking
  • Module 16 – Mobile Platforms Hacking

DAY 5

  • Module 17 – Parade for IDS, firewall and Honeypots
  • Module 18 – Buffer Overflow
  • Module 19 – Cryptography
  • Module 20 – Intrusion tests
UEC : 35
Duration : 5 Days
Regular Rate : 3,550.00 $
Preferential Rate : 3,017.50 $
Note :

EXAMS AND CERTIFICATION

  • The cost of the certification exam is INCLUDED with the training. The exam is planned by the student on the date of his choice
  • The CEH® certification exam is based on a multiple-choice questionnaire containing 125 questions regarding the whole training
  • Duration: 4 hours
  • A certificate is issued to participants who pass the exam

GENERAL INFORMATION

  • CEH® training manuals and DVDs are provided to each student


Upcoming Dates

For virtual classroom registration
the $ 3150 rate will apply upon billing.
Do your web registration normally.

qty