Certified Ethical Hacker (CEH)

by Kensley College Claim Listing

A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies

Price : Enquire Now

Contact the Institutes

Fill this form

Advertisement

Kensley College Logo

img Duration

Please Enquire

Course Details

A strong working knowledge of computers, networks, hardware and software. At least a year of experience working with networking technologies

 

What will You Learn?

  • Key issues plaguing the information security world are the incident management process and penetration testing.

  • Various types of foot printing, foot printing tools, and countermeasures.

  • Network scanning techniques and scanning countermeasures.

  • Enumeration techniques and enumeration countermeasures.

  • System hacking methodology, steganography, stegananalysis attacks, and covering tracks.

  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.

  • The working of viruses, virus analysis, computer worms, malware analysis procedures, and countermeasures.

  • Packet sniffing techniques and how to defend against sniffing.

  • Social engineering techniques, identifying theft, and social engineering countermeasures.

  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.

  • Session hijacking techniques and countermeasures.

  • There are different types of webserver attacks, attack methodologies, and countermeasures.

  • There are different types of web application attacks, web application hacking methodologies, and countermeasures.

  • SQL injection attacks and injection detection tools.

  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

  • Mobile platform attack vectors, Android vulnerabilities, mobile security guidelines, and tools.

  • Firewall, IDS, and honeypot evasion techniques, evasion tools, and countermeasures.

  • Various cloud computing concepts, threats, attacks, and security techniques and tools.

  • There are different types of cryptography ciphers, public key infrastructure (PKI), cryptography attacks, and cryptanalysis tools.

  • Various types of penetration testing, security audits, vulnerability assessments, and penetration testing roadmaps.

  • Perform vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems.

  • Different threats to IoT platforms and learn how to defend IoT devices securely.

 

 

CEH Course Outline

  • Introduction to Ethical Cyber Piracy

  • Foot printing and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Cyber Piracy

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS

  • Firewalls and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT Hacking

  • Cloud Computing

  • Cryptography

  • Montreal Branch

    209-279 Rue Sherbrooke O, Montreal

Check out more CEH (Certified Ethical Hacker) courses in Canada

ORION Logo

CEH (Certified Ethical Hacker)

The Certified Ethical Hacker (C|EH v10) program is an accredited ethical hacking training program that provides the advanced hacking tools and techniques used by hackers and information security professionals to break into an organization’s digital systems.

by ORION [Claim Listing ]
TBC (Toronto Business College) Logo

Certified Ethical Hacker Training

This course is designed to help you master an ethical hacking methodology that can be used in penetration testing to systematically and lawfully assess the security of a system.

by TBC (Toronto Business College) [Claim Listing ]
Seneca College Logo

Ethical Hacking and Network

Students learn who an ethical hacker is, why they are important to protecting corporate and government data from cyber attacks and about the tools and penetration testing methodologies used by ethical hackers.

by Seneca College [Claim Listing ]
  • Price
  • Start Date
  • Duration
Institute of IT Training Canada Logo

Software Ethical Hacking Certification

Introduction to ethics: hacking foot-printing and reconnaissance scanning networks: enumeration vulnerability analysis system hacking malware threats sniffing social engineering denial of service session hijacking evading ids, firewalls, and honeypots.

by Institute of IT Training Canada [Claim Listing ]
  • Price
  • Start Date
  • Duration
Cap2sec Logo

Certified Ethical Hacker Certification

This training offers a quick but rigorous preparation to the Certified Ethical Hacker(CEH®) exam of the EC-Council. Participants will learn how to evaluate, test and penetrate their own systems. With the help of several practical exercises, they will acquire an in-depth knowledge of security syste...

by Cap2sec [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy