fbpx

Certified Ethical Hacker (CEH)

  • Home
  • Certified Ethical Hacker (CEH)

Certified Ethical Hacker (CEH)

Posted on 18 Apr, 2018

Duration

5 Days

Categories

Information security

4.5 (23)

Course Overview

To beat a hacker, you need to think like one! This is exactly what this class will teach you. It is the pinnacle of the most desired information security training program any information security professional will ever want to be in to master the hacking technologies. To think like a hacker, you need to be one! The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker.

Objective
The objective is to facilitate organizations in ascertaining the vulnerabilities and security flaws before their exploitation by hackers. Ethical hackers mimic the approach adopted by hackers with minimum disruption in services. The extent of the tests depends on the contract between the ethical hacker and the organization.

Course Benefits
The Certified Ethical Hacker

(CEH) certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor neutral perspective.


The Certified Ethical Hacker certification enhances the skill sets of security administrators, network administrators, security auditors and other IT professionals. Certified Ethical hackers are skilled in identifying the threat vectors in the IT infrastructure and use their expertise in strengthening the defenses against security threats.

Target Audience
  • Security Officers
  • Auditors
  • Network Administrators
  • Firewall Administrators
  • Security Professionals

Pre-Requisites

  • Strong knowledge of TCP/IP
  • Information systems and security background
  • Minimum of 12 months of experience in networking technologies

Examinations:

  • Number of Questions: 125
  • Passing Score: 70%
  • Test Duration: 4 Hours
  • Test Format: Multiple Choice
  • Test Delivery: Prime Prometric (IBT), VUE, and APTC

Course outline

1. Introduction to Ethical Hacking

2. Foot printing and Reconnaissance

3. Scanning Networks

4. Enumeration

5. System Hacking

6. Trojans and Backdoors

7. Viruses and Worms

8. Sniffers

9. Social Engineering

10. Denial of Service

11. Session Hijacking

12. Hacking Web servers

13. Hacking Web Applications

14. SQL Injection

15. Hacking Wireless Networks

16. Hacking Mobile Platforms

17. Evading IDS, Firewalls and Honey pots

18. Buffer Overflows

19. Cryptography

20. Penetration Testing

Curriculum

  • Lectures
  • Starts on 09 Apr 2018 to 13 Apr | 07 May 2018 to 11 May 2018 in Nairobi

Generic selectors
Exact matches only
Search in title
Search in content
Search in posts
Search in pages
Filter by Categories
Our Blog
Information Security Courses

UPCOMING COURSES

ISO 27001 ISMS Foundation Lead Implemntor & Auditor
30 Apr 2018 to 04 May 2018

Certified Information System Auditor (CISA)
14 May 2018 to 18 May 2018

Certified Information Security Manager (CISM)
21 May 2018 to 25 May 2018

Certified Information System Security Professional (CISSP)
25 Jun 2018 to 29 Jun 2018

Computer Hacking Forensics Investigator (CHFI)
04 Jun 2018 to 08 Jun 2018

Information Security Resilience Foundation & Practitioner

23 Jul 2018 to 27 Jul 2018

 

Do you wish to study this Course? Do not hesitate, Contact Us for more information