Certified Ethical Hacker v.13 AI (CEH)
The goal of this course is to help master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. Course includes over 200 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.
The latest, 13th version, has been supplemented with information on artificial intelligence (AI) powered tools and techniques to help identify cyber threats and protect systems even more effectively.
Plans
Contact us
Apply or ask a question!
If you want to apply for the course or ask a question about it, feel free to use this form. |
||||||||||||||||||||
|
||||||||||||||||||||
Contact us
Apply or ask a question!
If you want to apply for the course or ask a question about it, feel free to use this form. |
||||||||||||||||||||
|
||||||||||||||||||||
Contact us
Apply or ask a question!
If you want to apply for the course or ask a question about it, feel free to use this form. |
||||||||||||||||||||
|
Course target
CEH v.12 course helps you learn how to hack ethically, ensuring compliance with any security policy. Participants is going to learn risk mitigation techniques and develop skills in penetration testing, social engineering, foot printing, reconnaissance, vulnerability scanning, malware detection and analysis as well as get hands-on experience in remediation and the use of automation tools for faster and more efficient penetration testing. Participants will gain knowledge on attack vectors, network security, mobile platforms and cloud computing.
Audience
- Information Security Analyst
- Administrator
- Information Assurance (IA) Security
- Officer
- Information Security Manager
- Specialist
- Information Systems Security Engineer
- Manager
- Information Security Professionals
- Officers
- Information Security / IT Auditors
- Risk / Threat/Vulnerability Analyst
- System Administrators
- Network Administrators and Engineers
At Course Completion
Upon completion of this course, students will learn:
- Key issues plaguing the information security world, incident management process, and penetration testing;
- Various types of foot printing, foot printing tools, and countermeasures;
- Network scanning techniques and scanning countermeasures;
- Enumeration techniques and enumeration countermeasures;
- System hacking methodology, steganography, steganalysis attacks, and covering tracks;
- Different types of Trojans, Trojan analysis, and Trojan countermeasures;
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures;
- Packet sniffing techniques and how to defend against sniffing;
- Social Engineering techniques, identify theft, and social engineering countermeasures;
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures;
- Session hijacking techniques and countermeasures;
- Different types of webserver attacks, attack methodology, and countermeasures;
- Different types of web application attacks, web application hacking methodology, and countermeasures;
- SQL injection attacks and injection detection tools;
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools;
- Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools;
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures;
- Various cloud computing concepts, threats, attacks, and security techniques and tools;
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools;
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap;
- Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems;
- Different threats to IoT platforms and learn how to defend IoT devices securely.
Prerequisites
Before attending this course, participant must have a strong working knowledge of TCP/IP, Windows Server, a basic familiarity with Linux and/or Unix, and should ideally have at least two years’ IT experience.
Training materials
EC-Council training materials and iLabs.
Certification Exam
Certified Ethical Hacker v12 (ANSI) exam. Code: 312-50 (ECC EXAM) (the exam fee is already included in the course price).
Course outline
- Module 01: Introduction to Ethical Hacking;
- Module 02: Foot printing and Reconnaissance;
- Module 03: Scanning Networks;
- Module 04: Enumeration<;
- Module 05: Vulnerability Analysis;
- Module 06: System Hacking;
- Module 07: Malware Threats;
- Module 08: Sniffing;
- Module 09: Social Engineering;
- Module 10: Denial-of-Service;
- Module 11: Session Hijacking;
- Module 12: Evading IDS, Firewalls, and Honeypots;
- Module 13: Hacking Web Servers;
- Module 14: Hacking Web Applications;
- Module 15: SQL Injection;
- Module 16: Hacking Wireless Networks;
- Module 17: Hacking Mobile Platforms;
- Module 18: IoT Hacking;
- Module 19: Cloud Computing;
- Module 20: Cryptography.
If you want to get more information about this course, contact us by phone +371 67505091 or send an e-mail at mrn@bda.lv.