CEH: Certified Ethical Hacker

$2,750.00

  • Duration: 5 Days
  • Mode of Delivery: Online -Instructor-led training
  • Job role: Cyber Security Analyst, Security Operations Analyst
  • Preparation for exam: CEH
  • Cost: USD$2,750.00

Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker. The individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods as a Hacker. The CEH (Certified Ethical Hacker) certification is one of the most sought-after cybersecurity certifications around the globe. Organizations like the DoD and ANSI have endorsed and/or accredited the CEH course. CEH certification is governed by EC-Council.

20 in stock (can be backordered)

SKU: SY0-2-2 Categories: , , , ,

Audience

  • Information Security Analyst/Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager/Specialist
  • Information Systems Security Engineer/Manager
  • Information Security Professionals/Officers
  • Information Security/IT Auditors
  • Risk/Threat/Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers

Prerequisites

There are no educational prerequisites for this course. However, you should have a strong background in core IT concepts such as network infrastructure, computer hardware, software and security.

Skills Gained

After completing this course, participants will be able to work with:
Attacks, Threats and Vulnerabilities
• Focusing on more threats, attacks, and vulnerabilities on the Internet from newer custom devices that must be mitigated, such as IoT and embedded devices, newer DDoS attacks, and social engineering attacks based on current events.
Architecture and Design
• Includes coverage of enterprise environments and reliance on the cloud, which is growing quickly as organizations transition to hybrid networks.
Implementation
• Expanded to focus on administering identity, access management, PKI, basic cryptography, wireless, and end-to-end security.
Operations and Incident Response
• Covering organizational security assessment and incident response procedures, such as basic threat detection, risk mitigation techniques, security controls, and basic digital forensics.
Governance, Risk and Compliance
• Expanded to support organizational risk management and compliance to regulations, such as PCI-DSS, SOX, HIPAA, GDPR, FISMA, NIST, and CCPA.

Course outline

  • Introduction to Ethical Hacking
  • Foot-printing and Reconnaissance
  • Scanning Networks
  • Enumeration
  • Vulnerability Analysis
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial-of-Service
  • Session Hijacking
  • Evading IDS, Firewalls, and Honeypots
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • IoT and OT Hacking
  • Cloud Computing
  • Cryptography

Schedule

Click on the following link to see the Current Course Schedule
Our minimum class-size is 3 for this course.
If there are no scheduled dates for this course, it can be customized to suit the time and skill needs of clients and it can be held online, at a rented location or at your premises.
Click on the following link below to arrange for a custom course: Enquire about a course date

Product Information

Ethical hackers use their knowledge to secure and improve the technology of organizations. They provide an essential service to these organizations by looking for vulnerabilities that can lead to a security breach. An ethical hacker reports the identified vulnerabilities to the organization. Businesses and organizations hire ethical hackers to help improve their networks, applications, and other computer systems in order to prevent data theft and fraud. An ethical hacker will attempt to bypass system security, and find and expose any weak points that could be taken advantage of by a malicious hacker. Vulnerabilities are typically found in improper system configuration and in hardware or software flaws. One of the first examples of ethical hacking occurred in the 1970s when the US government used ‘red teams’ to hack its own computer systems.
Ethical hacking is a proactive form of information security. An ethical hacker uses the same techniques to bypass a system’s defenses as a malicious hacker, but rather than take advantage of any vulnerabilities they find, they provide advice on how to fix the vulnerabilities so a company can improve its overall security.

Additional Information and FAQs

CERTFICATE OF COMPLETION: Participants will receive a certificate of completion at the end of a course. This is not an official certification for the product and/or software. Our courses do indicate the appropriate certification exam(s) that the participant can sit. Data Vision Systems does not provide certification or deliver the certification exams. Participants are responsible for arranging and paying for the certification exams on the appropriate certification body.

CANCELLATION POLICY: There is never a fee for cancelling seven business days before a class for any reason. Data Vision Systems reserves the right to cancel any course due to insufficient registration or other extenuating circumstances. Participants will be advised prior to doing so.

Reviews

There are no reviews yet.

Be the first to review “CEH: Certified Ethical Hacker”

Your email address will not be published. Required fields are marked *