CEH (Certified Ethical Hacking)

User Avatar
₨ 22,500

Register Now

Hurry up! Register Now for a limited number of seats.


ceh
Download PDF

Program Description

Ever wonder what it takes to become an ethical hacker?

Ethical hacking is becoming a popular skill for security, IT operations, and developer personnel to have. By taking the “attacker’s perspective,” it becomes easier to see the weaknesses in your own environment and to start shoring up those environments.

This training program provides the knowledge needed to ethically and effectively discover and exploit vulnerabilities in systems by assuming both the mindset and toolset of an attacker. Through learning how systems are attacked, you will gain an understanding of how best to protect systems and improve your organization’s security. This training program will help you to prepare for the EC-Council® CEH® (Certified Ethical Hacker) examination, with coverage of CEHv10.

Obtaining the CEH certification is the first step towards the Certified Network Defense Architect (CNDA™) certification.

Program Objectives

By the end of the program the participants would be able to:

  • Know the difference between “hacking” and “ethical hacking”
  • Learn the five phases of ethical hacking
  • Know how to identify vulnerabilities
  • Learn to defend against attacks

Program Audience

  • IT Security Officers / Professionals
  • IT Auditors
  • IT Site Administrators
  • Anyone who is concerned about the integrity of the network infrastructure.

Pre-Requisite(s) to Attend Program

  • No ethical hacking experience is required for this training
  • It is recommended that you possess a strong understanding of TCP/IP and operating systems
  • At least one year of experience working with networking technologies.

Training Methodology

It will be an interactive training course which will involve a comprehensive presentation made by an experienced trainer as well as include:

  • Penetration Testing
  • Incident Response
  • Q&A sessions
  • Case studies
  • Dialogue between course participants
  • Interactive discussions and brainstorming sessions

Program Outlines

Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography

Course Features

  • Lectures 0
  • Quizzes 0
  • Duration 05 Days (40 hours)
  • Skill level All levels
  • Language English
  • Students 20
  • Assessments Yes

You have 5 days remaining for the course

Curriculum is empty
₨ 22,500

Register Now

Hurry up! Register Now for a limited number of seats.


Dates

Jun 24 2019 - Jun 28 2019

Days & Timings

9:00 am - 5:00 pm

Location

CoE-IT(IT Academy, PAF)
Old Airport Building, Abid Majeed Road, Lahore Cantt.