Certified Ethical Hacker (C|EH)

by Sas Management Sdn Bhd Claim Listing

The certified ethical hacker (c|eh v10) program, currently on its 10th iteration, is a trusted and respected ethical hacking training program that will provide you with the tools and techniques used by hackers and information security professionals alike.

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Sas Management Sdn Bhd Logo

img Duration

5 Days

Course Details

The certified ethical hacker (c|eh v10) program, currently on its 10th iteration, is a trusted and respected ethical hacking training program that will provide you with the tools and techniques used by hackers and information security professionals alike. 

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification.

Learning Objectives
At the end of the course, the participant will learn about:

  • Key issues plaguing the information security world, incident management process, and penetration testing.
  • Various types of footprinting, footprinting tools, and countermeasures.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Packet sniffing techniques and how to defend against sniffing.
  • Social Engineering techniques, identify theft, and social engineering countermeasures.
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Session hijacking techniques and countermeasures.
  • Different types of webserver attacks, attack methodology, and countermeasures.
  • Different types of web application attacks, web application hacking methodology, and countermeasures.
  • SQL injection attacks and injection detection tools.
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  • Various cloud computing concepts, threats, attacks, and security techniques and tools.
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • Different threats to IoT platforms and learn how to defend IoT devices securely.
  • Petaling Jaya Branch

    6F-16, IOI Business Park, Persiaran Puchong Jaya. 47170, Petaling Jaya

Check out more CEH (Certified Ethical Hacker) courses in Malaysia

Trainocate Malaysia Logo

Ceh: Certified Ethical Hacker V12 (Pro)

The ultimate ethical hacking certification. Certified ethical hacker ceh v12 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

by Trainocate Malaysia [Claim Listing ]
Axsel Management International Sdn Bhd Logo

Ethical Hacking & Countermeasures

Ethical Hacking & Countermeasures course is offered by Axsel Management International Sdn Bhd. Experienced trainers and educationists who have successfully taken up administrative and management roles in various reputable higher private education institutions for the past 20 years.

by Axsel Management International Sdn Bhd [Claim Listing ]
Bumiputera Education Leader Foundation Logo

Certified Ethical Hacker Technology

Certified Ethical Hacker Technology course is offered by Bumiputera Education Leader Foundation. Understanding the challenges of the industry's needs, the programs we run not only focus on technical competence but also 'soft skills'.

by Bumiputera Education Leader Foundation [Claim Listing ]
Tertiary Courses Malaysia Logo

Ethical Hacking Specialization (5 Days)

Dive into the world of cybersecurity with our 5 days ethical hacking specialisation, a meticulously designed course to foster the next generation of ethical hackers. This program offers an immersive experience, ensuring that participants acquire critical skills in identifying vulnerabilities, secur...

by Tertiary Courses Malaysia [Claim Listing ]
Corporate Frontier Logo

Certified Ethical Hacker (Certification Program by EC Council)

The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.

by Corporate Frontier [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy