Certified Ethical Hacker - CEHv7
MTC Training offers this product as a default in the following regions: N/A
Overview
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When …
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
Overview
This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50
Duration
5 Long Days
Target Audience
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Topics
Introduction to Ethical HackingFootprinting and
Reconnaissance
Scanning Networks
Enumeration
System Hacking
Trojans and Backdoors
Viruses and Worms
Sniffers
Social Engineering
Denial of Service
Session Hijacking
Hacking Webservers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Evading IDS, Firewalls and Honeypots
Buffer Overflows
Cryptography
Penetration Testing
A more comprehensive course outline is available in the Course Download section, to the right of this page.
MTC serves the whole of the North East region, including, Sunderland, Newcastle, Durham Teesside, Tyne and Wear, Cumbria, Northumberland, Darlington, North Yorkshire, Carlisle, Hartlepool. In addition MTC supports many clients nationally within the UK.
There are no frequently asked questions yet. If you have any more questions or need help, contact our customer service.
