CEH - Certified Ethical Hackers Version 7.0 (CEH)
The Certified Ethical Hacker (CEH) program is the core of the most desired information security training system any information security professional will ever want to be in. The CEH, is the first part of a 3-part EC-Council Information Security Track which helps you master hacking technologies. You will become a hacker, but an ethical one. For more information on class schedules, please contact us at enquiry@trainocate.com.
難易度: 入門
課程總時數: 40 小時
課堂數: 5
開課日期: 2017-11-13
星期幾: , , , ,
NTD 3,400

課程說明

Course Overview

Course Duration 5 days.

**CEH - Certified Ethical Hackers Version 7.0, **Prepare for the CEH certification while learning the latest ethical hacking techniques. If you're concerned about the integrity of your network's infrastructure, you need the ethical hacking tools and techniques you will learn in Certified Ethical Hacker (CEH) v7 to enhance your network's defenses. You'll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you'll learn how intruders operate and the steps you can take to secure a system.

Who Should Attend

  • This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Course Certifications

This course is part of the following Certifications:

Prerequisites

  • At least two years of IT security experience and a strong working knowledge of TCP/IP. Security+ Prep Course is highly recommended.

Course Objectives

  • Footprinting and reconnaissance
  • Hacking web servers, web applications, and wireless networks
  • Cryptography
  • Penetration testing
  • Social engineering
  • Trojans, viruses, and worms
  • Evading IDS, firewalls, and honeypots
  • Enumeration
  • Buffer overflows

Course Content

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Trojans and Backdoors
  • Viruses and Worms
  • Sniffers
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflows
  • Cryptography
  • Penetration Testing