Upload
others
View
8
Download
0
Embed Size (px)
Citation preview
Learners PointT R A I N I N G
CERTIFIEDETHICAL HACKER V10
follow uslearnerspoint.org
UPSKILL NOW
The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professionalwill need. Since its inception in 2003, the Certified Ethical Hacker has been the absolute choice of the industry globally. It is a respected certification in the industry and is listed as a baseline certification on the United States Depart-ment of Defense Directive 8570. The CEH exam is ANSI 17024 compliant adding credibility and value to credential members.
Our security experts have designed over 140 labs which mimic real-timescenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in a 5-day hands-on class by our Certified EC- Council Instructor. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situa-tion. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
Training summary
Training summary
Located at theheart of Dubai
We are also associated with CPD UK, the premier accreditation service provider in the United Kingdom.
Learners Point is a well-recognized institute in corporate and individual training in the MENA region and has contributed to the career success of more than 110,000 professionals since its founding in 2001. We are ISO 9001:2015 quality management system certified.
Our training institute is licensed by the Governmentof Dubai, UAE, and our certifications are widely recognized by employers around the globe.
Audience
01
Who shouldattend theprogram?
The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Eligibility criteria:In order to be eligible to attempt EC-Council CEH, certification examination, candidate may opt to:
Attend official training:If a candidate attends an official instructor-led training (ILT), computer-based training (CBT), online live training, or academic learning, candidate is eligible to attempt the relevant EC-Council exam
Attempt Exam without official training:In order to be considered for the EC-Council CEH exam without attending official training, candidate must have at least two years of information securi-ty related experience and remit a non- refundable eligibility application fee of USD 100.00 along with their application form.
Objectives
Objectives
By the end of this Certified Ethical Hacking program, you will be able to accomplish the following:• Students are able to discover the key issues plaguing the information security world, incident management process, and penetration testing• Students are able to determine different threats to IoT platforms and learn how to defend IoT devices securely• Students are able to understand mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools• Students are able to implement wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools• Students are able to perform vulnerability analysis to identify security loopholes in the target organization’s network, communica tion infrastructure, and end systems
Course outline
Module 01Introduction toethical hacking
Module 02Footprinting andreconnaissance
Module 03Scanning networks
Module 04Enumeration
Module 05Vulnerability analysis
Module 06System hacking
Module 07Malware threats
Module 08Sniffing
Module 09Social engineering
Module 10Denial-of-service
Course outline
Course outline
Module 16Hackingwireless networks
Module 17Hackingmobile platforms
Module 18IoT hacking
Module 19Cloud computing
Module 20Cryptography
Module 11Session hijacking
Module 12Evading IDS, firewalls,and honeypots
Module 13Hacking web servers
Module 14Hacking webapplications
Module 15SQL injection
CEH- CHFI- ECSA/LPT- EDRP- ECIH- CSA-CISM Certified Professional offering over 14 years of experience in Network Administrator, VMware, threat handlingand Security Administration.
IT Infrastructure Domain includingtechnology upgrades, system andmanaging backup, storage, network attached storage as per agreed criteria & exceeded the standards for clientsatisfaction by delivering high revenues, Management Expertise – Creating RFP aligned to the business case, Reviewing Proposal, Analyzing the Project, Monitoring/Change Management – HPITSM (IT-Service Management).
Trainer
About our trainer
Comprehensive experience in technical solution architecting and conceptu-alization for enterprise wide IT solutions / application development with alignment of business/information systems delivering technology-driven IT solutions. Wealth of technical expertise entails use of Data Center prod-ucts, Datacenter Infrastructure Applications, Operating Systems, Databas-es, Replication/Disaster Recovery, Security and Data Protection. Ensured system hardware, operating systems, software systems, and related proce-dures adhere to organizational values, enabling staff, volunteers, and part-ners. Expertise in performing maintenance, backups and system upgrades including service packs, patches, hot fixes and security configuration issues raised by clients
Student review
Students reviewNameel Ibrahim: IT Professional“I have recently finished this course from Learners Point and I must say that the teaching methods were high-quality and interactive. This course helped me to understand the ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. I would like to recommend Learn-ers Point for Ethical Hacker v10 course.”
Anu Sharal: University Student“I enrolled for Ethical Hacker v10 Training. The course modules were well-structured with hand-on projects and assignments. The trainer was knowledgeable and patient. I would highly recommend this course who wants to upskill v10 with theoreti-cal and practical knowledge.”
+971 (04) 403 8000 | (04) 3266 880
#610 - Business Center, Burjman Metro StationExit 4, Mashreq Bank Building - Dubai
learnerspoint.org
follow us
Learners PointT R A I N I N G