NoScript Tracker
This training is offered in the form of face-to-face training.

Description

Description
What is an Ethical Hacker?
  • An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.
  • To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them.
  • Ethical hacking is also known as penetration testing, intrusion testing and red teaming.
Abstract
  • Certified Ethical Hacking (C|EH) v12 training provides a comprehensive ethical hacking and network security- training program to meet the standards of highly skilled security professionals.
  • This is the world’s most advanced ethical hacking course with 19 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organisation.
  • The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
  • The CEH class deals with real life scenarios and threats and will ensure that attendees understand how to look for weaknesses and vulnerabilities in a target system.
Objectives
The CEH training course is comprised of 19 modules that will be covered over the 5 days:
  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking Hacking
  • Webservers Hacking Web
  • Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflow
  • Cryptography
  • Penetration Testing
Programme
Day 1
  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
Day 2
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
Day 3
  • Social Engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and countermeasures
  • Different types of web application attacks, web application hacking methodology, and countermeasures
Day 4
  • SQL injection attacks and injection detection tools
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wireless security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
Day 5
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Various cloud computing concepts, threats, attacks, and security techniques and tools
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
Target audience

The Certified Ethical Hacking training course will significantly benefit those who are involved in or responsible for, Computer Forensics Investigations:

  • IT Security Officers
  • Network Administrators
  • Members of the Information Security Team
  • Site Administrators
  • Anyone dealing with network infrastructure integrity

Conditions

Support de cours

Le support de cours sera délivré en début du cours.

PLEASE NOTE: The training is delivered in French while training materials are in English.

Certification

This course prepares you for the EC-Council Certified Ethical Hacker (312-50) exam. A voucher will be provided.

Lieu
OXiane Luxembourg
20, rue de l’Industrie
8399 Windhof
Luxembourg
Calculer l'itinéraire