Certified Ethical Hacker (CEH)

by Kensley College Claim Listing

A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Kensley College Logo

img Duration

Please Enquire

Course Details

A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies

 

What will You Learn?

  • Key issues plaguing the information security world are the incident management process and penetration testing.

  • Various types of foot printing, foot printing tools, and countermeasures.

  • Network scanning techniques and scanning countermeasures.

  • Enumeration techniques and enumeration countermeasures.

  • System hacking methodology, steganography, stegananalysis attacks, and covering tracks.

  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.

  • The working of viruses, virus analysis, computer worms, malware analysis procedures, and countermeasures.

  • Packet sniffing techniques and how to defend against sniffing.

  • Social engineering techniques, identifying theft, and social engineering countermeasures.

  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.

  • Session hijacking techniques and countermeasures.

  • There are different types of webserver attacks, attack methodologies, and countermeasures.

  • There are different types of web application attacks, web application hacking methodologies, and countermeasures.

  • SQL injection attacks and injection detection tools.

  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

  • Mobile platform attack vectors, Android vulnerabilities, mobile security guidelines, and tools.

  • Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures.

  • Various cloud computing concepts, threats, attacks, and security techniques and tools.

  • There are different types of cryptography ciphers, public key infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

  • Various types of penetration testing, security audits, vulnerability assessments, and penetration testing roadmaps.

  • Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems.

  • Different threats to IoT platforms and learn how to defend IoT devices securely.

 

 

CEH Course Outline

  • Introduction to Ethical Cyber Piracy

  • Foot printing and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Cyber Piracy

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS

  • Firewalls and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Cryptography

  • Montreal Branch

    209-279 Rue Sherbrooke O, Montreal

Check out more CEH (Certified Ethical Hacker) courses in Canada

Koenig Solutions LTD Logo

Certified Ethical Hacker V12 Certification Training

C|EH v12 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

by Koenig Solutions LTD [Claim Listing ]
ProTech Training Logo

EC-Council Certified Ethical Hacker v13 (CEHv13)

The Certified Ethical Hacker (CEH v13) training program is designed to equip professionals with the essential skills to become proficient in ethical hacking and cybersecurity.

by ProTech Training [Claim Listing ]
Seneca College Logo

Ethical Hacking and Network

Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber attacks and about the tools and penetration testing methodologies used by ethical hackers.

by Seneca College [Claim Listing ]
  • Price
  • Start Date
  • Duration
Seneca Part-time Studies Logo

Ethical Hacking and Network

Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber attacks and about the tools and penetration testing methodologies used by ethical hackers.

by Seneca Part-time Studies [Claim Listing ]
TBC (Toronto Business College) Logo

Certified Ethical Hacker Training

This course is designed to help you master an ethical hacking methodology that can be used in penetration testing to systematically and lawfully assess the security of a system.

by TBC (Toronto Business College) [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy