Certified Ethical Hacker (CEH)
The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. The Certified Ethical Hacker has been the absolute choice of the industry globally. You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
Course Duration: 45 Hours
Cover the fundamentals of key issues in the information security world,
including the basics of ethical hacking, information security controls,
relevant laws, and standard procedures.
Learn how to use the latest techniques and tools to perform foot
printing and reconnaissance, a critical pre-attack phase of the ethical hacking process.
Learn different network scanning techniques and countermeasures.
Learn various enumeration techniques, such as Border Gateway
Protocol (BGP) and Network File Sharing (NFS) exploits, and associated countermeasures.
Learn how to identify security loopholes in a target organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools.
Learn about the various system hacking methodologies-including steganography, steganalysis attacks, and covering tracks used to discover system and network vulnerabilities.
Learn different types of malware (Trojan, virus, worms, etc.), APT
and file-less malware, malware analysis procedure, and malware
Learn about packet sniffing techniques and how to use them to discover network vulnerabilities and countermeasures to defend against sniffing attacks.
Learn social engineering concepts and techniques, including how to
identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Learn about different Denial of Service (DoS) and Distributed Dos (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.