Certified Ethical Hacker (CEH)

by Nexperts Academy Claim Listing

The certified ethical hacker (ceh) course offered by nexperts academy is a comprehensive training program designed to equip professionals with the skills and knowledge necessary to identify and prevent potential security threats. The course covers a wide range of topics, including network security,

RM6650

Contact the Institutes

Fill this form

Advertisement

Nexperts Academy Logo

img Duration

5 Days

Course Details

The certified ethical hacker (ceh) course offered by nexperts academy is a comprehensive training program designed to equip professionals with the skills and knowledge necessary to identify and prevent potential security threats. The course covers a wide range of topics, including network security, system security, cryptography, and ethical hacking methodologies. 

Participants will gain practical hands-on experience through the use of EC-Council's iLabs platform, as well as engaging with real-world examples of cyber-attacks and countermeasures. The course is delivered by accredited trainers and is available both in the classroom and online, allowing participants to choose the mode of learning that suits them best. 

Upon completion of the course, participants will receive a certificate of completion from Nexperts Academy and will be eligible to take the CEH certification exam issued by EC-Council. In the event that a participant does not pass the exam on their first attempt, Nexperts Academy offers a free exam retake and provides access to an exam preparation guide to help participants prepare. 

Overall, the CEH course offered by Nexperts Academy is a highly practical and engaging program that is designed to equip professionals with the knowledge and skills necessary to protect their organizations against cyber-attacks. 

Fee including: 

  • Materials 
  • EC Council Labs 
  • Examination voucher 
  • Examination retake voucher  
  • Preparation for examination 
  • Trained by Certified trainers 

​Upon completion of the CEHv13 course, learners will have acquired the following skills and knowledge: 

  • Understanding of ethical hacking concepts, methodologies, and tools 
  • Knowledge of common hacking techniques and how to counter them 
  • Ability to perform network scanning and vulnerability analysis 
  • Ability to identify and address security weaknesses in web servers and applications 
  • Knowledge of mobile platform, wireless, cloud computing, and IoT/OT hacking techniques 
  • Understanding of cryptography concepts and tools 
  • Hands-on experience in using ethical hacking tools to address security vulnerabilities 
  • Preparation for the CEHv13 certification exam

Tools Learners Will Be Using
Throughout the course, learners will use a range of tools, including:  

  • ​Nmap 
  • Nessus 
  • Metasploit 
  • Wireshark 
  • Aircrack-ng 
  • Cain and Abel 
  • John the Ripper 
  • Sqlmap 
  • Burp Suite 
  • Social-Engineer Toolkit 
  • Maltego 
  • Hydra 
  • Nikto 
  • Netcat 

Training Deliverables

  • Comprehensive course materials, including presentation slides, handouts, and reference guides 
  • Access to online training materials, including video lectures, quizzes, and practice exercises 
  • Hands-on lab exercises to practice applying the course concepts in a real-world environment 
  • Access to EC Council hacking lab -Hands-on practice in simulated environments, including virtual machines and hacking labs 
  • Classroom and online training options to accommodate different learning styles and preferences 
  • Expert instructors with extensive industry experience and knowledge of the latest cybersecurity trends and best practices 
  • A dedicated support team to answer questions and provide assistance throughout the course 
  • Exam preparation guide to help students prepare for the certification exam 
  • Practice exam to simulate the certification exam experience and assess readiness 
  • Free exam retake if the student fails the exam on their first attempt (terms and conditions apply) 
  • Certificate of completion issued by Nexperts Academy to showcase the student's achievement and demonstrate their knowledge and skills to employers 

Target Audience

  • Information Security Analyst 1 
  • Security Analyst L1 
  • Cyber Defense Analyst 
  • Vulnerability Assessment Analyst 
  • Network Security Engineer 
  • SOC Security Analyst 
  • Security Analyst 
  • Cybersecurity Analyst level 1, level 2, & level 3 
  • Mid-Level Information Security Auditor 
  • Cybersecurity Auditor 
  • IT Security Administrator 
  • Cybersecurity Consultant 
  • Senior SOC Analyst 
  • Warning Analyst 
  • Infosec Security Administrator 
  • Solution Architect 
  • Network Engineer 
  • Information Security Manager 
  • Senior Security Consultant 
  • Security Administrator

Skills You Will Gain

The CEHv13 course will provide learners with a range of skills, including: 

  • ​An understanding of information security laws, standards, and controls 
  • The ability to perform footprinting and reconnaissance on computer systems and networks 
  • The ability to scan networks and identify vulnerabilities 
  • The ability to enumerate computer systems and networks 
  • The ability to perform vulnerability analysis and assessment 
  • The ability to hack into computer systems and networks 
  • An understanding of malware threats and the ability to counter them 
  • The ability to perform network sniffing and social engineering attacks 
  • An understanding of denial-of-service attacks and the ability to counter them 
  • The ability to perform session hijacking and evade IDS, firewalls, and honeypots 
  • The ability to hack web servers and applications 
  • An understanding of SQL injection and the ability to counter it 
  • The ability to hack wireless networks and mobile platforms 
  • An understanding of IoT and OT hacking 
  • An understanding of cloud computing and cryptography

Objectives
Sure, here are some possible course objectives for the Certified Ethical Hacker v13 (CEH v13) course: 

  • ​Understand the principles and practices of ethical hacking and information security 
  • Develop expertise in various hacking methodologies and frameworks, and learn how to apply them effectively 
  • Master different hacking concepts and ethical hacking concepts, and use them for securing computer networks and systems 
  • Learn about the different information security controls, laws, and standards that apply to ethical hacking and cybersecurity 
  • Gain knowledge of footprinting and reconnaissance techniques, and use them to collect information about potential targets 
  • Learn about network scanning, host discovery, port and service discovery, and OS fingerprinting techniques, and use them to detect vulnerabilities in computer networks 
  • Master the art of enumeration, and learn how to gather information about system resources and user accounts in computer networks 
  • Develop expertise in vulnerability assessment and analysis, and learn how to identify vulnerabilities and assess their impact on computer networks and systems 
  • Understand the various malware threats, APT concepts, Trojan concepts, and fileless malware concepts, and learn how to counter them effectively 
  • Gain knowledge of sniffing techniques, MAC attacks, DHCP attacks, ARP poisoning, and spoofing attacks, and learn how to use them to analyze network traffic and detect security breaches 
  • Develop expertise in social engineering techniques, and learn how to use them to manipulate individuals and groups to gain unauthorized access to computer networks and systems 
  • Learn about denial-of-service attacks, botnets, DDoS attack techniques, and DDoS case studies, and develop skills in countermeasures and defense mechanisms 
  • Gain knowledge of session hijacking concepts, application-level session hijacking, and network-level session hijacking, and learn how to use them to take control of user sessions 
  • Develop expertise in evading IDS, firewalls, and honeypots, and learn how to use IDS/Firewall evasion tools and countermeasures to bypass security mechanisms
  • Learn about web server and web application hacking, SQL injection concepts and methodology, wireless network hacking, mobile platform hacking, IoT and OT hacking, and cloud computing security concepts 
  • Develop skills in cryptography concepts, encryption algorithms, email encryption, disk encryption, and cryptography attack countermeasures.

Training Mode

  • Physical Classroom Training (Malaysia)
  • On-site Company Training (Malaysia)
  • Online Training via Microsoft Teams/ZOOM. (Malaysia and International) 
  • Petaling Jaya Branch

    Unit 313 Block E, Phileo Damansara 1, Jalan 16/11 off Jalan Damansara, Petaling Jaya

Check out more CEH (Certified Ethical Hacker) courses in Malaysia

Trainocate Malaysia Logo

Ceh: Certified Ethical Hacker V12 (Pro)

The ultimate ethical hacking certification. Certified ethical hacker ceh v12 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

by Trainocate Malaysia [Claim Listing ]
Axsel Management International Sdn Bhd Logo

Ethical Hacking & Countermeasures

Ethical Hacking & Countermeasures course is offered by Axsel Management International Sdn Bhd. Experienced trainers and educationists who have successfully taken up administrative and management roles in various reputable higher private education institutions for the past 20 years.

by Axsel Management International Sdn Bhd [Claim Listing ]
Bumiputera Education Leader Foundation Logo

Certified Ethical Hacker Technology

Certified Ethical Hacker Technology course is offered by Bumiputera Education Leader Foundation. Understanding the challenges of the industry's needs, the programs we run not only focus on technical competence but also 'soft skills'.

by Bumiputera Education Leader Foundation [Claim Listing ]
Tertiary Courses Malaysia Logo

Ethical Hacking Specialization (5 Days)

Dive into the world of cybersecurity with our 5 days ethical hacking specialisation, a meticulously designed course to foster the next generation of ethical hackers. This program offers an immersive experience, ensuring that participants acquire critical skills in identifying vulnerabilities, secur...

by Tertiary Courses Malaysia [Claim Listing ]
Corporate Frontier Logo

Certified Ethical Hacker (Certification Program by EC Council)

The Certified Ethical Hacker has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.

by Corporate Frontier [Claim Listing ]

© 2024 coursetakers.com All Rights Reserved. Terms and Conditions of use | Privacy Policy