Duração:
12 meses
Próxima Data:
Consulte-nos
Local:
Descrição
The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.
This course includes:
- Instructor-led, streaming video training modules- 1 year access
- Official EC-Council e-courseware 1 year access iLabs, virtual lab platform – 6 months access
- Certificate of Attendance
- Certification Exam Voucher
- 3 hours of QA/ exam preparation in Virtual Learning Format with a Ignít Trainer
More Details:
- Access keys must be redeemed within 12 months of purchase
- This is single user license and may not be shared
- The duration of EC-Council e-learning courses is 12 months, but pay attention you only have access to ILabs for 6 months.
- We recommend completing them in 3 months for better results.
Destinatários
Information Security Analyst / Administrator Information Assurance (IA) Security Officer Information Security Manager / Specialist Information Systems Security Engineer / Manager Information Security Professionals / Officers Information Security / IT Auditors Risk / Threat/Vulnerability Analyst System Administrators Network Administrators and Engineers
-
Área: CybersecurityEC-Council
-
Certificação Associada: 312-50 (ECC EXAM); 312-50 (VUE) Certified Ethical Hacker (ANSI)
Programa:
Module 1: Introduction to Ethical Hacking
Module 2: Foot-printing and Reconnaissance
Module 3: Scanning Networks
Module 4: Enumeration
Module 5: Vulnerability Analysis
Module 6: System Hacking
Module 7: Malware Threats
Module 8: Sniffing
Module 9: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT and OT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
Pré-requisitos:
Have two years’ IT work experience and a possess a basic familiarity of Linux and/or Unix. A strong working knowledge of:
- TCP/IP
- Windows Server
Partilha: