3
Pages 1 Pages 1 CEH- Certified Ethical Hacker Duration- 5 days Course Overview CEH program is the peak of the most preferred informa- tion security training pro- gram any information se- curity professional will want to be into. This course will enlighten you on how to un- derstand Information Secu- rity Threats and Attack Vec- tors. It will immerse you into the Hacker Mindset for you to be able to defend against future attack. The CEH course is which helps you master hacking technologies. You will be- come not just a hacker, but an ethical one! What you will learn. Network scanning Enumeration Packet sniffing Social Engineering DoS/DDoS attacks Session hijacking SQL injection attacks

CEH- Certified Ethical Hacker Duration- 5 days

  • Upload
    others

  • View
    19

  • Download
    0

Embed Size (px)

Citation preview

Page 1: CEH- Certified Ethical Hacker Duration- 5 days

Page

s 1

Page

s 1

CEH- Certified Ethical Hacker

Duration- 5 days

Course Overview

CEH program is the peak of the most preferred informa-tion security training pro-gram any information se-curity professional will want to be into. This course will enlighten you on how to un-

derstand Information Secu-rity Threats and Attack Vec-tors. It will immerse you into the Hacker Mindset for you to be able to defend against future attack.

The CEH course is which helps you master hacking technologies. You will be-come not just a hacker, but an ethical one!

What you will learn.

• Network scanning• Enumeration• Packet sniffing• Social Engineering• DoS/DDoS attacks• Session hijacking• SQL injection attacks

Page 2: CEH- Certified Ethical Hacker Duration- 5 days

Page

s 2

sionals involved with informa-tion system security.

• Security officers• Auditors• Security professionals• Site administrators

Prerequisites

There are no specific pre-requi-sites. By the way, some appre-ciation of the ideas and princi-ples of services may be useful.

COURSE OUTLINES

Module 01: Introduction to Ethi-cal HackingModule 02: Footprinting and Re-connaissanceModule 03: Scanning NetworksModule 04: EnumerationModule 05: Vulnerability Analy-sisModule 06: System HackingModule 07: Malware ThreatsModule 08: Sniffing

• Wireless encryption• Cryptography ciphers• Penetration testing• Footprinting• Webserver and web appli-

cation attacks and counter-measures

• Cloud computing threats

Who is this course for?

The course is for an IT profes-

Page 3: CEH- Certified Ethical Hacker Duration- 5 days

Page

s 3

Module 09: Social EngineeringModule 10: Denial-of-ServiceModule 11: Session HijackingModule 12: Evading IDS, Firewalls, and HoneypotsModule 13: Hacking Web ServersModule 14: Hacking Web Appli-cations

Module 15: SQL InjectionModule 16: Hacking Wireless Net-worksModule 17: Hacking Mobile Plat-formsModule 18: IoT HackingModule 19: Cloud ComputingModule 20: Cryptography