CEH EC Certified Ethical Hacker

Level

CEH EC Certified Ethical Hacker

Focus on Training
Logo Focus on Training

Need more information? Get more details on the site of the provider.

Starting dates and places
There are no known starting dates for this product.

Focus on Training offers this product as a default in the following regions: N/A

Description

Security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

The course showcases the tools required to be an Ethical Hacker. The Instructor will lead the class through proof of concept and finish on how to use the tools successfully in an attack. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Students are required to commit not to use the knowledge gained for illegal or malicious purposes.

Introduction to Ethical Hacking

Footprinting

Google Hacking

Scanning

Enumeration

System Hacking

Trojans and Backdoors

Viruses and Worms

Snif…

Read the complete description

Frequently asked questions

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.

Didn't find what you were looking for? See also: Certified Ethical Hacker (CEH), EC-Council, CompTIA A+ / Network+ / Security+, IT Security, and Security.

Security officers, auditors, security professionals, site administrators and anyone who is concerned about the integrity of the network infrastructure.

The course showcases the tools required to be an Ethical Hacker. The Instructor will lead the class through proof of concept and finish on how to use the tools successfully in an attack. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking.

Students are required to commit not to use the knowledge gained for illegal or malicious purposes.

Introduction to Ethical Hacking

Footprinting

Google Hacking

Scanning

Enumeration

System Hacking

Trojans and Backdoors

Viruses and Worms

Sniffers

Denial-of-Service

Session Hijacking

Hacking Web Servers

Web Application Vulnerabilities

Web-Based Password Cracking Techniques

SQL Injection

Hacking Wireless Networks

Physical Security

Linux Hacking

Evading IDS, Firewalls and Detecting Honey Pots

Buffer Overflows

Cryptography

There are no reviews yet.
Share your review
Do you have experience with this course? Submit your review and help other people make the right choice. As a thank you for your effort we will donate £1.- to Stichting Edukans.

There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.