Bit - loader
Bit - Curso Certified Ethical Hacker |CEH

Curso Certified Ethical Hacker |CEH


Introducción a: Curso Certified Ethical Hacker |CEH

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council ANSI accredited Certified Ethical Hacker exam 312-50.


Perfil de los alumnos

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

 


Requisitos previos

  • Strong knowledge of TCP/IP
  • Information systems and security background
  • Minimum of 12 months of experience in networking technologies
  • knowledge of Linux and Windows

Profesorado

Our team of highly qualified instructors combine training activities with the development of their profession as experts in the field of IT. Professionals certified by the major manufacturers, they are capable of transferring the most abstract concepts in an enjoyable and easy way.

 


Documentación

A copy of the netmind’s documentation.

 


Contenidos del Curso Certified Ethical Hacker |CEH

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. System hacking
  6. Trojans and Backdoors
  7. Viruses and Worms
  8. Sniffers
  9. Social Engineering
  10. Denial of Service
  11. Session Hijacking
  12. Hacking Webservers
  13. Hacking Web Applications
  14. SQL Injection
  15. Hacking Wireless Networks
  16. Hacking Mobile Platforms
  17. Evading IDS, Firewalls and Honeypots
  18. Buffer Overflow
  19. Cryptography
  20. Penetration Testing

Cursos relacionados
Nuestro sitio utiliza cookies para análisis. Si no estás seguro de ello, echa un vistazo a nuestra política de privacidad.