Sale

Certified Ethical Hacker | CEH Course

SR 7,500 SR 3,750

  • Riyadh    21 – 24 July 2019
  • Jeddah    7 – 10 July 2019
Clear
SKU: N/A Category:
  • Description
  • Additional information
  • Reviews (0)
  • Announcement
  • About the Program

Description

“C|EH is the world’s most advanced ethical hacking course.


Course Description

C|EH is the world’s most advanced ethical hacking course covering 20 of the most important security domains any individual will need when they are planning to beef-up the information security posture of their organization. The course provides hacking techniques and tools used by hackers and information security professionals. To provide employers with the confidence that you not only know your stuff, but can do the job, challenge the C|EH (Practical) exam to proof your skills.


Students going through CEH training will learn:

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social Engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and countermeasures
  • Different types of web application attacks, web application hacking methodology, and countermeasures
  • SQL injection attacks and injection detection tools
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Various cloud computing concepts, threats, attacks, and security techniques and tools
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
[ultimate_ctation ctaction_padding_bottom=”18″ text_font_size=”desktop:16px;”]

Exam voucher are included with the course and passing the exam will qualify you to be certified. These certification are internationally recognized and are maintained and developed by EC COUNCIL

[/ultimate_ctation]

Additional information

REGISTRATION FEES (CEH)

Early Bird, Group Registration 3 & Above, Regular Fees

CEH in-class Course Timing

Dammam 7th – 11th April 2019, Jeddah 7th -11th July 2019, Riyadh 31st March – 4th April 2019

Reviews

There are no reviews yet.


Only logged in customers who have purchased this product may leave a review.

Important Notice :

All courses manuals and materials in English and main language of training is English and minimum English proficiency is required to attend

Key Outcomes :

  • Thorough introduction to ethical hacking
  • Exposure to threat vectors and counter measures
  • Addresses emerging areas of cloud and mobile hacking
  • Prepares you to combat Trojans, malware,backdoors and more
  • Enables you to hack using mobile

About the Program

Duration: 5 days (40 hours)

About the Exam

Number of Questions: 125

Passing Score: 70%

Test Duration: 4 hours

Test Format: MCQ

Test Delivery: ECC Exam Portal

Course Outline

  1. Introduction to Ethical Hacking
  2. Footprinting and Reconnaissance
  3. Scanning Networks
  4. Enumeration
  5. Vulnerability Analysis
  6. System Hacking
  7. Malware Threats
  8. Sniffing
  9. Social Engineering
  10. Denial-of-Service
  11. Session Hijacking
  12. Evading IDS, Firewalls, and Honeypots
  13. Hacking Web Servers
  14. Hacking Web Applications
  15. SQL Injection
  16. Hacking Wireless Networks
  17. Hacking Mobile Platforms
  18. IoT Hacking
  19. Cloud Computing
  20. Cryptography