ceh ethical hacker - clslearn.com€¦ · ethical hacking training program that any information...

6
CEH Ethical Hacker

Upload: others

Post on 20-May-2020

9 views

Category:

Documents


0 download

TRANSCRIPT

CEH Ethical Hacker

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348

Course Overview

CEH Ethical Hacker Duration:40 Hours

Schedule :Full Day Morning ( 9-5)

Half Day Evening (6-10)

Weekends Full Day (10-4)

Instructor-Led

Hands-On Training

Delivery Options:

In CLS Classroom.

On site Classroom.

Online Live.

Your Training Comes with

a 100% Satisfaction

Guarantee!

The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. C|EH is used as a hiring standard and is a core sought after certification by many of the Fortune 500 organizations, governments, cybersecurity practices, and many of the most prominent degree programs in top Universities around the globe. Cyber Security as a profession is evolving, the barrier to entry is rising, the demand for Skilled Cyber professionals continues to grow, but it is being refined, demanding a higher level of skill and ability. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348

Course Outline

Module 01: Introduction to Ethical Hacking

Module 02: Foot printing and ReconnaissanceModule 03: Scanning NetworksModule 04: EnumerationModule 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware ThreatsModule 08: SniffingModule 09: Social EngineeringModule 10: Denial-of-ServiceModule 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web ApplicationsModule 15: SQL Injection

Module 16: Hacking Wireless NetworksModule 17: Hacking Mobile PlatformsModule 18: IoT HackingModule 19: Cloud ComputingModule 20: Cryptography

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348

Course Outcome Audience Profile

* Key issues plaguing the information security world, incident

management process, and

* penetration testing.

* Various types of foot printing, footprinting tools, and

countermeasures.

* Network scanning techniques and scanning countermeasures.

* Enumeration techniques and enumeration countermeasures.

* System hacking methodology, steganography, steganalysis

attacks, and covering tracks.

* Different types of Trojans, Trojan analysis, and Trojan

countermeasures.

* Working of viruses, virus analysis, computer worms, malware

analysis procedure, and

* countermeasures.

* Packet sniffing techniques and how to defend against sniffing.

* Social Engineering techniques, identify theft, and social

engineering countermeasures.

* DoS/DDoS attack techniques, botnets, DDoS attack tools, and

DoS/DDoS countermeasures.

* Session hijacking techniques and countermeasures.

The Certified Ethical Hacking training

course will significantly benefit security

officers, auditors, security professionals, site

administrators, and anyone who is

concerned about the integrity of the

network infrastructure.

Prerequisites

No – Prerequisites

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348

We select the best instructors, who are certified from trustworthy

international vendors. They don’t only provide training program, but they

also share their professional experience with the students, so they can have

hands-on experience on the job market.

CLS facilities are well-equipped with strong hardware and software

technologies that aid both students and trainers lead very effective

smooth training programs.

We provide our clients with the best solutions, Our team of training advisers

answer whatever questions you have.

We have been in the market since 1995, and we kept accumulating

experience in the training business, and providing training for more than

100,000 trainees ever since, in Egypt, and the MENA region.

CLS is an authorized and accredited partner by technology leaders like

Microsoft, EC-Council, Adobe and Autodesk. This means that our

training programs are of the highest quality source materials, the most

up-to-date, and have the highest return on investment ever possible.

We keep tabs on every change in the market and the technology field,

so our training programs will always be updated up to the World-class

latest standards, and adapted to the global shape-shifting job market.

Our clients prefer our training programs not only for the quality

education they get, but also because they are cost effective.

All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348