C |EH (Practical)

The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical
hacking training Program that any information security professional will need.
Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice
of the industry globally. It is a respected certification in the industry and is listed as
a baseline certification on the United States Department of Defense Directive 8570.
The C|EH exam is ANSI 17024 compliant adding credibility and value to credential
members.

Duration:

50 Hrs

Prerequisites:

• Basic knowledge of Networking
• Knowledge of server and network components

CodeNameDuration (Hrs)
CEH-PracticalCertified Ethical Hacker (Practical)50

After you complete this course you will be able to:

After you complete this course you will be able to:
• Network scanning techniques and scanning countermeasures.
• System hacking methodology, steganography, steganalysis attacks, and covering tracks.
• Different types of Trojans, Trojan analysis, and Trojan countermeasures.
• Working with viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
• Packet sniffing techniques and how to defend against sniffing.
• Social Engineering techniques, identify theft, and social engineering countermeasures.
• DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
• Different types of web server & web application attacks.
• SQL injection attacks & Wireless Encryption.
• Mobile platform attack vector & android vulnerabilities
• Various cloud computing concepts, threats, attacks, and security techniques and tools.
• Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
• Different threats to IoT platforms and to defend IoT devices securely.
• It can help IT professionals get into the minds of a typical hacker and take preventive steps to safeguard systems, devices, and networks.
• Understanding the lifecycle of exploits that expose security vulnerabilities is also a key consideration. A CEH will know what it takes to foolproof the systems and networks.
• Completing a CEH course can be your Launchpad for advanced IT security certification courses such as penetration testing, audit certifications, and forensics.
• In this ever-connected digital world, the demand for CEH professionals is quite high as companies, want to prevent losses arising out of data breaches.

This course is designed for:

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.