Ceh : Certified Ethical Hacker v13

by Iverson Claim Listing

Ceh v13 powered with ai capabilities was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the ceh credential and perform the job

RM6696

Contact the Institutes

Fill this form

Advertisement

Iverson Logo

img Duration

5 Days

Course Details

Ceh v13 powered with ai capabilities was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the ceh credential and perform the job of an ethical hacker. 

The certified ethical hacker (ceh) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. Ceh v13 powered with ai capabilities will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the ceh course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack. 

Learn

  • 5 days of training
  • 20 modules
  • 3000 plus pages of student manual
  • 1900 plus pages of lab manual
  • Over 200 hands-on labs with competition flags
  • Over 3,500 hacking tools - Learn how to hack multiple operating systems (Windows 11, Windows servers, Linux, Ubuntu, Android)
  • MITRE Attack Framework
  • Diamond model of intrusion analysis
  • Techniques for establishing persistence
  • Evading NAC and endpoint security
  • Understand Fog, Edge, and Grid Computing Model

Audience Profile

  • Mid-Level Information Security Auditor
  • Cybersecurity Auditor
  • Security Administrator
  • IT Security Administrator
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • Information Security Analyst 1
  • Security Analyst L1
  • Infosec Security Administrator
  • Cybersecurity Analyst level 1, level 2, & level 3
  • Network Security Engineer
  • SOC Security Analyst
  • Security Analyst
  • Network Engineer
  • Senior Security Consultant
  • Information Security Manager
  • Senior SOC Analyst
  • Solution Architect
  • Cybersecurity Consultant

Prerequisites

  • There are no specific prerequisites for the c|eh program, however we strongly recommend candidates possess a minimum of 2 years’ experience in it security before joining a c|eh training program. C|eh training is about testing systems and using them for purposes not originally intended, candidates should understand the basic functions of those it systems before attempting to hack them. (example: c|eh will teach the process of host evaluation leading to enumeration, in this process trainees will scan downrange targets using common scanning techniques such as nmap which will respond with a list of ports, enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems. The c|eh program will not teach you what a port is, that is essential knowledge you must have to be successful in the class. ) 

At course completion

  • C|eh is divided into 20 modules and delivered through a carefully curated training plan that typically spans across 5 days. As you progress through your training, each module offers extensive hands-on lab components that allow you to practice the techniques and procedures taught in the program in real-time on live machines. 

Ethical Hacking Labs

  • With over 220 hands-on labs, conducted in our cyber range environment, you will have the opportunity to practice every learning objective in the course on live machines and vulnerable targets. Pre-loaded with over 3,500 hacking tools and a variety of operating systems, you will gain unprecedented exposure to and hands-on experience with the most common security tools, latest vulnerabilities, and widely used operating systems on the market. Our range is web accessible, allowing you to study and practice from anywhere with a connection.

Course Outline
Module 1: Introduction to Ethical Hacking

  • Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Module 2: Foot Printing and Reconnaissance

  • Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking

Module 3: Scanning Networks

  • Learn different network scanning techniques and countermeasures.

Module 4: Enumeration

  • Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.

Module 5: Vulnerability Analysis

  • Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.

Module 6: System Hacking

  • Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.

Module 7: Malware Threats

  • Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.

Module 8: Sniffing

  • Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.

Module 9: Social Engineering

  • Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Module 10: Denial-of-Service

  • Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Module 11: Session Hijacking

  • Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Module 12: Evading IDS, Firewalls, and Honeypots

  • Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Module 13: Hacking Web Servers

  • Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Module 14: Hacking Web Applications

  • Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.

Module 15: SQL Injection

  • Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.

Module 16: Hacking Wireless Networks

  • Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Module 17: Hacking Mobile Platforms

  • Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Module 18: IoT and OT Hacking

  • Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.

Module 19: Cloud Computing

  • Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Module 20: Cryptography

  • Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
  • Petaling Jaya Branch

    Suites T113-T114, 3rd Floor, Centrepoint, Lebuh Bandar Utama, Petaling Jaya
  • Kuala Lumpur Branch

    17-5 & 19-5, The Boulevard Mid Valley City, Lingkaran Syed Putra, 59200, Kuala Lumpur

Check out more CEH (Certified Ethical Hacker) courses in Malaysia

Corporate Frontier Logo

Certified Ethical Hacker (Certification Program by EC Council)

The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.

by Corporate Frontier [Claim Listing ]
UniKL Logo

Certified Ethical Hacker

Certified Ethical Hacker course is offered by UniKL. Strengthen your resume and broaden your understanding of key concepts to reach your professional and personal goals.

by UniKL [Claim Listing ]
New Horizons Logo

Certified Ethical Hacker v11

Certified Ethical Hacker training course is offered by New Horizons. We are the authorised learning partner to the top technology providers.

by New Horizons [Claim Listing ]
Nexperts Academy Logo

Certified Ethical Hacker (CEH)

The certified ethical hacker (ceh) course offered by nexperts academy is a comprehensive training program designed to equip professionals with the skills and knowledge necessary to identify and prevent potential security threats. The course covers a wide range of topics, including network security,

by Nexperts Academy [Claim Listing ]
Goldentusks Sdn Bhd Logo

Professional Hacker

Certified Ethical Hacker is a qualification obtained by demonstrating knowledge of assessing the security of computer systems by looking for weaknesses and vulnerabilities in target systems.

by Goldentusks Sdn Bhd [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy