Upload
others
View
7
Download
0
Embed Size (px)
Citation preview
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348
Course Overview
CEH Ethical Hacker Duration:40 Hours
Schedule :Full Day Morning ( 9-5)
Half Day Evening (6-10)
Weekends Full Day (10-4)
Instructor-Led
Hands-On Training
Delivery Options:
In CLS Classroom.
On site Classroom.
Online Live.
Your Training Comes with
a 100% Satisfaction
Guarantee!
The Certified Ethical Hacker (C|EH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need. C|EH is used as a hiring standard and is a core sought after certification by many of the Fortune 500 organizations, governments, cybersecurity practices, and many of the most prominent degree programs in top Universities around the globe. Cyber Security as a profession is evolving, the barrier to entry is rising, the demand for Skilled Cyber professionals continues to grow, but it is being refined, demanding a higher level of skill and ability. This course will immerse you into a “Hacker Mindset” in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver’s seat with a hands-on training environment employing a systematic ethical hacking process. You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348
Course Outline
Module 01: Introduction to Ethical Hacking
Module 02: Foot printing and ReconnaissanceModule 03: Scanning NetworksModule 04: EnumerationModule 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware ThreatsModule 08: SniffingModule 09: Social EngineeringModule 10: Denial-of-ServiceModule 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web ApplicationsModule 15: SQL Injection
Module 16: Hacking Wireless NetworksModule 17: Hacking Mobile PlatformsModule 18: IoT HackingModule 19: Cloud ComputingModule 20: Cryptography
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348
Course Outcome Audience Profile
* Key issues plaguing the information security world, incident
management process, and
* penetration testing.
* Various types of foot printing, footprinting tools, and
countermeasures.
* Network scanning techniques and scanning countermeasures.
* Enumeration techniques and enumeration countermeasures.
* System hacking methodology, steganography, steganalysis
attacks, and covering tracks.
* Different types of Trojans, Trojan analysis, and Trojan
countermeasures.
* Working of viruses, virus analysis, computer worms, malware
analysis procedure, and
* countermeasures.
* Packet sniffing techniques and how to defend against sniffing.
* Social Engineering techniques, identify theft, and social
engineering countermeasures.
* DoS/DDoS attack techniques, botnets, DDoS attack tools, and
DoS/DDoS countermeasures.
* Session hijacking techniques and countermeasures.
The Certified Ethical Hacking training
course will significantly benefit security
officers, auditors, security professionals, site
administrators, and anyone who is
concerned about the integrity of the
network infrastructure.
Prerequisites
No – Prerequisites
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348
We select the best instructors, who are certified from trustworthy
international vendors. They don’t only provide training program, but they
also share their professional experience with the students, so they can have
hands-on experience on the job market.
CLS facilities are well-equipped with strong hardware and software
technologies that aid both students and trainers lead very effective
smooth training programs.
We provide our clients with the best solutions, Our team of training advisers
answer whatever questions you have.
We have been in the market since 1995, and we kept accumulating
experience in the training business, and providing training for more than
100,000 trainees ever since, in Egypt, and the MENA region.
CLS is an authorized and accredited partner by technology leaders like
Microsoft, EC-Council, Adobe and Autodesk. This means that our
training programs are of the highest quality source materials, the most
up-to-date, and have the highest return on investment ever possible.
We keep tabs on every change in the market and the technology field,
so our training programs will always be updated up to the World-class
latest standards, and adapted to the global shape-shifting job market.
Our clients prefer our training programs not only for the quality
education they get, but also because they are cost effective.
All Rights reserved @ www.clslearn.com , Contact us : [email protected] , +201000216660 , +201001692348