Certified Ethical Hacker (CEH)

by Kensley College Claim Listing

A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Kensley College Logo

img Duration

Please Enquire

Course Details

A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies

 

What will You Learn?

  • Key issues plaguing the information security world are the incident management process and penetration testing.

  • Various types of foot printing, foot printing tools, and countermeasures.

  • Network scanning techniques and scanning countermeasures.

  • Enumeration techniques and enumeration countermeasures.

  • System hacking methodology, steganography, stegananalysis attacks, and covering tracks.

  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.

  • The working of viruses, virus analysis, computer worms, malware analysis procedures, and countermeasures.

  • Packet sniffing techniques and how to defend against sniffing.

  • Social engineering techniques, identifying theft, and social engineering countermeasures.

  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.

  • Session hijacking techniques and countermeasures.

  • There are different types of webserver attacks, attack methodologies, and countermeasures.

  • There are different types of web application attacks, web application hacking methodologies, and countermeasures.

  • SQL injection attacks and injection detection tools.

  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

  • Mobile platform attack vectors, Android vulnerabilities, mobile security guidelines, and tools.

  • Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures.

  • Various cloud computing concepts, threats, attacks, and security techniques and tools.

  • There are different types of cryptography ciphers, public key infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

  • Various types of penetration testing, security audits, vulnerability assessments, and penetration testing roadmaps.

  • Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems.

  • Different threats to IoT platforms and learn how to defend IoT devices securely.

 

 

CEH Course Outline

  • Introduction to Ethical Cyber Piracy

  • Foot printing and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Cyber Piracy

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS

  • Firewalls and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Cryptography

  • Montreal Branch

    209-279 Rue Sherbrooke O, Montreal

Check out more CEH (Certified Ethical Hacker) courses in Canada

Montreal College Of Information Technology Logo

Certified Ethical Hacking CEH v11

Are you enthusiastic to begin your career in the IT industry and ever wondered which path could be the right one? This course is tailor-made for you for it prepares you for the industry-standard CompTIAA+ certification exam.

by Montreal College Of Information Technology [Claim Listing ]
Q Academy Logo

Certified Ethical Hacker

The Certified Ethical Hacker certification is a globally recognized credential that validates your knowledge and skills in ethical hacking.

by Q Academy [Claim Listing ]
Institute of IT Training Canada Logo

Software Ethical Hacking Certification

Introduction to ethics: hacking foot-printing and reconnaissance scanning networks: enumeration vulnerability analysis system hacking malware threats sniffing social engineering denial of service session hijacking evading ids, firewalls, and honeypots.

by Institute of IT Training Canada [Claim Listing ]
  • Price
  • Start Date
  • Duration
Koenig Solutions LTD Logo

Certified Ethical Hacker V12 Certification Training

C|EH v12 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

by Koenig Solutions LTD [Claim Listing ]
ProTech Training Logo

EC-Council Certified Ethical Hacker v13 (CEHv13)

The Certified Ethical Hacker (CEH v13) training program is designed to equip professionals with the essential skills to become proficient in ethical hacking and cybersecurity.

by ProTech Training [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy