CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential. You will be exposed to an entirely different posture toward the responsibilities and measures required to be secure. Now in its 12th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.
The Certified Ethical Hacking v12 course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
This course includes an exam voucher.
1 - Introduction to Ethical Hacking
2 - Foot-printing and Reconnaissance
3 - Scanning Networks
4 - Enumeration
5 - Vulnerability Analysis
6 - System Hacking
7 - Malware Threats
8 - Sniffing
9 - Social Engineering
10 - Denial-of-Service
11 - Session Hijacking
12 - Evading IDS, Firewalls, and Honeypots
13 - Hacking Web Servers
14 - Hacking Web Applications
15 - SQL Injection
16 - Hacking Wireless Networks
17 - Hacking Mobile Platforms
18 - IoT and OT Hacking
19 - Cloud Computing
20 - Cryptography
Course Comments
This course includes an exam voucher.
Upcoming Classes
December 02, 2024