Ceh : Certified Ethical Hacker v13

by Iverson Claim Listing

Ceh v13 powered with ai capabilities was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the ceh credential and perform the job

RM6696

Contact the Institutes

Fill this form

Advertisement

Iverson Logo

img Duration

5 Days

Course Details

Ceh v13 powered with ai capabilities was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the ceh credential and perform the job of an ethical hacker. 

The certified ethical hacker (ceh) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. Ceh v13 powered with ai capabilities will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the ceh course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack. 

Learn

  • 5 days of training
  • 20 modules
  • 3000 plus pages of student manual
  • 1900 plus pages of lab manual
  • Over 200 hands-on labs with competition flags
  • Over 3,500 hacking tools - Learn how to hack multiple operating systems (Windows 11, Windows servers, Linux, Ubuntu, Android)
  • MITRE Attack Framework
  • Diamond model of intrusion analysis
  • Techniques for establishing persistence
  • Evading NAC and endpoint security
  • Understand Fog, Edge, and Grid Computing Model

Audience Profile

  • Mid-Level Information Security Auditor
  • Cybersecurity Auditor
  • Security Administrator
  • IT Security Administrator
  • Cyber Defense Analyst
  • Vulnerability Assessment Analyst
  • Warning Analyst
  • Information Security Analyst 1
  • Security Analyst L1
  • Infosec Security Administrator
  • Cybersecurity Analyst level 1, level 2, & level 3
  • Network Security Engineer
  • SOC Security Analyst
  • Security Analyst
  • Network Engineer
  • Senior Security Consultant
  • Information Security Manager
  • Senior SOC Analyst
  • Solution Architect
  • Cybersecurity Consultant

Prerequisites

  • There are no specific prerequisites for the c|eh program, however we strongly recommend candidates possess a minimum of 2 years’ experience in it security before joining a c|eh training program. C|eh training is about testing systems and using them for purposes not originally intended, candidates should understand the basic functions of those it systems before attempting to hack them. (example: c|eh will teach the process of host evaluation leading to enumeration, in this process trainees will scan downrange targets using common scanning techniques such as nmap which will respond with a list of ports, enumerating those ports and the services running on them can be used to expose common vulnerabilities and weaknesses in systems. The c|eh program will not teach you what a port is, that is essential knowledge you must have to be successful in the class. ) 

At course completion

  • C|eh is divided into 20 modules and delivered through a carefully curated training plan that typically spans across 5 days. As you progress through your training, each module offers extensive hands-on lab components that allow you to practice the techniques and procedures taught in the program in real-time on live machines. 

Ethical Hacking Labs

  • With over 220 hands-on labs, conducted in our cyber range environment, you will have the opportunity to practice every learning objective in the course on live machines and vulnerable targets. Pre-loaded with over 3,500 hacking tools and a variety of operating systems, you will gain unprecedented exposure to and hands-on experience with the most common security tools, latest vulnerabilities, and widely used operating systems on the market. Our range is web accessible, allowing you to study and practice from anywhere with a connection.

Course Outline
Module 1: Introduction to Ethical Hacking

  • Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.

Module 2: Foot Printing and Reconnaissance

  • Learn how to use the latest techniques and tools for footprinting and reconnaissance, a critical pre-attack phase of ethical hacking

Module 3: Scanning Networks

  • Learn different network scanning techniques and countermeasures.

Module 4: Enumeration

  • Learn various enumeration techniques, including Border Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.

Module 5: Vulnerability Analysis

  • Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.

Module 6: System Hacking

  • Learn about the various system hacking methodologies used to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.

Module 7: Malware Threats

  • Learn about different types of malware (Trojan, viruses, worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures.

Module 8: Sniffing

  • Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.

Module 9: Social Engineering

  • Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.

Module 10: Denial-of-Service

  • Learn about different Denial of Service (DoS) and Distributed DoS (DDoS) attack techniques, plus the tools used to audit a target and devise DoS and DDoS countermeasures and protections.

Module 11: Session Hijacking

  • Learn the various session-hijacking techniques used to discover network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.

Module 12: Evading IDS, Firewalls, and Honeypots

  • Learn about firewalls, intrusion detection systems (IDS), and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.

Module 13: Hacking Web Servers

  • Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.

Module 14: Hacking Web Applications

  • Learn about web application attacks, including a comprehensive hacking methodology for auditing vulnerabilities in web applications and countermeasures.

Module 15: SQL Injection

  • Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.

Module 16: Hacking Wireless Networks

  • Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.

Module 17: Hacking Mobile Platforms

  • Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.

Module 18: IoT and OT Hacking

  • Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.

Module 19: Cloud Computing

  • Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools.

Module 20: Cryptography

  • Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools.
  • Petaling Jaya Branch

    Suites T113-T114, 3rd Floor, Centrepoint, Lebuh Bandar Utama, Petaling Jaya
  • Kuala Lumpur Branch

    17-5 & 19-5, The Boulevard Mid Valley City, Lingkaran Syed Putra, 59200, Kuala Lumpur

Check out more CEH (Certified Ethical Hacker) courses in Malaysia

TC Training Center Certified Logo

Certified Ethical Hacker

Certified Ethical Hacker course is offered by TC Training Center Certified. Our vision at TC Training Center is to be a leading and distinguished center in the field of training and education in the preparation of trainees in various fields professionally.

by TC Training Center Certified [Claim Listing ]
Tertiary Courses Malaysia Logo

Ethical Hacking Specialization (5 Days)

Dive into the world of cybersecurity with our 5 days ethical hacking specialisation, a meticulously designed course to foster the next generation of ethical hackers. This program offers an immersive experience, ensuring that participants acquire critical skills in identifying vulnerabilities, secur...

by Tertiary Courses Malaysia [Claim Listing ]
Axsel Management International Sdn Bhd Logo

Ethical Hacking & Countermeasures

Ethical Hacking & Countermeasures course is offered by Axsel Management International Sdn Bhd. Experienced trainers and educationists who have successfully taken up administrative and management roles in various reputable higher private education institutions for the past 20 years.

by Axsel Management International Sdn Bhd [Claim Listing ]
Bumiputera Education Leader Foundation Logo

Certified Ethical Hacker Technology

Certified Ethical Hacker Technology course is offered by Bumiputera Education Leader Foundation. Understanding the challenges of the industry's needs, the programs we run not only focus on technical competence but also 'soft skills'.

by Bumiputera Education Leader Foundation [Claim Listing ]
Sas Management Sdn Bhd Logo

Certified Ethical Hacker (C|EH)

The certified ethical hacker (c|eh v10) program, currently on its 10th iteration, is a trusted and respected ethical hacking training program that will provide you with the tools and techniques used by hackers and information security professionals alike.

by Sas Management Sdn Bhd [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy