
Ethical Hacking Training
Ethical hacking is referred to as Penetration Testing, red teaming or intrusion testing. We can come across various types of hackers in the IT world. Usually, ethical hackers are considered as white hat hackers. In fact, the industries require them for protection of their information and business-critical data. This skill is in high demand across organizations. One can easily kickstart his/her cybersecurity career with CEH v11.
About This Course
Learning Objectives
Target Audience
- Ethical hackers
- System Administrators
- Network Administrators
- Engineers
- Web managers
- Auditors
- Security Professionals
- Network security officers and practitioners
- Site administrators
- IS/IT Specialists and analysts
- IS/IT Auditors
- IT operations managers
- IT security officers
- Network specialists
- Technical support engineers
- Senior systems engineers
- Systems analysts
Curriculum
Ethical Hacking Overview and Threats
Hacking Concepts
Security Controls
Pentesting, Laws, and Standards
Footprinting
Host Discovery and Scanning with Nmap
ProxyChains and Enumeration
Vulnerability Analysis Concepts and Tools
Password Attacks
Privilege Escalation
Hidden Files and Covering Tracks
Malware Threats and Distribution
Network Sniffing
Social Engineering
Denial of Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Servers
Common Web App Threats
SQL Injection
Wireless Hacking Concepts
Wireless Hacking Tools
Cracking and Mobile Hacking
IoT Concepts and Attacks
Cloud Computing Concepts
Cryptography Concepts
Cryptography Attacks
IoT Hacking and Countermeasures
