EC-Council’s Certified Ethical Hacker training certifies a security professional as an Ethical Hacker and Penetration Tester. CEH training fortifies the abilities to guard against the weaknesses and vulnerabilities of network infrastructure and illegal hacking.
A CEH certification becomes imperative with the increasing security threats to computer networks and web servers and there is a great need to make networks “hacker-proof”. The best way to do this is by understanding the methods employed by hackers to intrude into systems. A Certified Ethical Hacker (CEH v9) starts thinking in a way an “illegal hacker” does but uses the EC-Council’s ethical hacking certification and tools to legally penetrate and test networks and computer systems.
This Ethical Hacking training will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab’s intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defences work and then will be led into scanning and attacking their own networks (no real network is harmed). During this Ethical Hacking course, students learn how intruders escalate privileges and what steps can be taken to secure a system.
1. Basic knowledge of Networking
2. Basic Knowledge of server and network components.
Recommended Courses and Certification:
• Computer Hacking Forensic Investigator (CHFI) V9
||CEH(Version 7/8/9) |
|NUMBER OF QUESTION-
DURATION ||4HOURS(240 MINUTES)|
|TEST FORMAT ||MULTIPLE CHOICE QUESTIONS |
|TEST DELIVERY || PERSON VUE AUTHORIZED CENTRE |
|EXAM COST ||$500 (INR-70*500$=35000)
|TRAINER NAME- ||MR ASHUTOSH SINGH
Certified Ethical Hacking Contents:
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: System Hacking
Module 06: Malware Threats
Module 07: Sniffing
Module 08: Social Engineering
Module 09: Denial of Service
Module 10: Session Hijacking
Module 11: Hacking Webservers
Module 12: Hacking Web Applications
Module 13: SQL Injection
Module 14: Hacking Wireless Networks
Module 15: Hacking Mobile Platforms
Module 16: Evading IDS, Firewalls, and Honeypots
Module 17: Cloud Computing
Module 18: Cryptography