Certified Ethical Hacker (CEH)

by Kensley College Claim Listing

A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Kensley College Logo

img Duration

Please Enquire

Course Details

A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies

 

What will You Learn?

  • Key issues plaguing the information security world are the incident management process and penetration testing.

  • Various types of foot printing, foot printing tools, and countermeasures.

  • Network scanning techniques and scanning countermeasures.

  • Enumeration techniques and enumeration countermeasures.

  • System hacking methodology, steganography, stegananalysis attacks, and covering tracks.

  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.

  • The working of viruses, virus analysis, computer worms, malware analysis procedures, and countermeasures.

  • Packet sniffing techniques and how to defend against sniffing.

  • Social engineering techniques, identifying theft, and social engineering countermeasures.

  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.

  • Session hijacking techniques and countermeasures.

  • There are different types of webserver attacks, attack methodologies, and countermeasures.

  • There are different types of web application attacks, web application hacking methodologies, and countermeasures.

  • SQL injection attacks and injection detection tools.

  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

  • Mobile platform attack vectors, Android vulnerabilities, mobile security guidelines, and tools.

  • Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures.

  • Various cloud computing concepts, threats, attacks, and security techniques and tools.

  • There are different types of cryptography ciphers, public key infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

  • Various types of penetration testing, security audits, vulnerability assessments, and penetration testing roadmaps.

  • Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems.

  • Different threats to IoT platforms and learn how to defend IoT devices securely.

 

 

CEH Course Outline

  • Introduction to Ethical Cyber Piracy

  • Foot printing and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Cyber Piracy

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS

  • Firewalls and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Cryptography

  • Montreal Branch

    209-279 Rue Sherbrooke O, Montreal

© 2025 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy