Course Description
The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks. By providing an understanding of system weaknesses and vulnerabilities, the CEH course helps students learn to protect their organizations and strengthen their security controls in order to minimize the risk of a malicious attack.
CEH was built to incorporate a hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work toward proving the required knowledge and skills needed to achieve the CEH credential and perform the job of an ethical hacker.
Course Outline
- Introduction to Ethical Hacking
- Foot-printing and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
Course Benefits
- Incorporating Parrot Security OS
- Re-mapped to NIST/NICE Framework
- Enhanced Cloud Security & IoT and Operational Technology (OT) Modules
- Modern Malware Analysis
- The industry’s Most Comprehensive Tools Library
Who should take this course?
- Cyber Security Forensic Analyst
- Cyber Security Analyst
- CND Security Specialist
- CND Fusion Analyst
- Cyberspace Network Defense (CND) Technician
- Cyber Red Team Operator
- Cyber Network Defense (CND) Analyst
- Cyber Security Forensic Analyst
- Computer Network Defense Intrusion Analyst
- Cyber Security Engineer
- Information Security Engineer
- CND Cyber Analyst
- Network Security Engineer
- Cyber Threat Analyst
- SOC Security Analyst
- Information Security Analyst
- IT Security Compliance Specialist
- Global Security Assurance Analyst
- Security Analyst Tier 3
- Security Operations Analyst
- Security Incident Response Analyst
- Penetration Tester
- Vulnerability Analyst
- Sr. Security Threat Analyst
- Senior Information Assurance/ Security Specialist
- Tier 3 NSOC Analyst
- Security Information Assurance Analyst
- Technical Security Analyst
- Information Security Manager
- Risk and Remediation Manager
- Systems Administrator
- Cybersecurity Network Analyst
- Cyber Security Vulnerability Analyst
- Risk Assessment- Security Consultant
- Information Security Associate – Insider Threat Analyst
- Security Architect, Manager
- Application Security Analyst
- Cyber Security System Engineer
- Software Security Analyst
- Network Analyst
- Information System Security Officer
- SOC Security Analyst
- Cyber Security Engineer II
- Senior Cyber Security Monitoring Analyst
- Cyber Security Incident Response, Incident Analyst
- Cyber Security Incident Response Engineer
- L2 Security Analyst
- Technical Operations Network Engineer
- IT Security Administrator