New
Level: Intermediate

Certified Ethical Hacker (CEH)

5 Day | Instructor Led

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. CEH provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed towards the content presented in the CEH courseware. Latest tools and exploits uncovered from the underground community are featured in the new package.

Inquire About
Certified Ethical Hacker (CEH)

Ideal Candidates for Certified Ethical Hacker (CEH) Class

Security officers
Auditors
Security professionals
Site administrators
Individuals concerned about the integrity of the network infrastructure

Certified Ethical Hacker (CEH) Prerequisites

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. Prospective students should have an information systems and security background, a strong knowledge of TCP/IP, and a minimum of 12 months experience in networking technologies.

What You'll Get in Certified Ethical Hacker (CEH)

What You'll Learn in Certified Ethical Hacker (CEH)

Students will begin by understanding perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed.

Students then learn how intruders escalate intruders escalate privileges and what steps can be taken to secure a system.

Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

No Certification Test Available For This Course

No Certification Test Available For This Course

Certified Ethical Hacker (CEH) Outline

1. Introduction to Ethical Hacking

2. Footprinting and Reconnaissance

3. Scanning Networks

4. Enumeration

5. System Hacking

6. Malware Threats

7. Sniffing

8. Social Engineering

9. Denial of Service

10. Session Hijacking

11. Hacking Webservers

12. Hacking Web Applications

13. SQL Injection

14. Hacking Wireless Networks

15. Hacking Mobile Platforms

16. Evading IDS, Firewalls, and Honeypots

17. Cloud Computing

18. Cryptography

Testimonials

A. Erlich

RITSC, N6C

I just wanted to say your presentation on Social Media Technology and Security was the finest I have ever attended.

Wilder Guerra

US Navy Reserve

This course is definitely an eye opener. With how much social media has taken over, it is important to be fully aware of the capabilities along with all the risks it brings. It is important to get this course because social media is the new norm.

Rebekah Coughlin

MicroTech

The Social Media and Security Training course offered by UKI is a great and beneficial course combining technical training to fully understand TCP IP networking, DNS, and the harms of malware and cross-site scripting; as well as practical training that allowed attendees to play with open source social intelligence gathering solutions. This is the perfect class for those involved in IT security and interested in social media and identity theft.


Top Related Courses

CompTIA Security+ SY0-401

The CompTIA Security+ certification designates knowledgeable professionals in the field of security, one of the fastest-growing fields in IT. Security threats are increasing in number and severity, and the gap between the need for security professionals and qualified IT personnel is the largest of any IT specialty, according to a 2008 CompTIA study. Even in a troubled economy, most businesses plan to maintain or increase their investment in security.


CCNA Security

This 8-day instructor-led Cisco Class is designed specifically to prepare students for successful completion of the CCENT, CCNA & CCNA Security Certification Exams. Cisco Certified Network Associate Security (CCNA Security) validates the ability to secure Cisco networks. With this training course, networking professionals will gain the skills required to develop a security infrastructure, recognize threats and vulnerabilities to networks, and mitigate security threats


© 2018 Ultimate Knowledge Insitute | All Rights Reserved | GSA# GS-35F-0469W