Certified Ethical Hacker – CEH
|Topic||Certified Ethical Hacker – CEH|
|Time||17:30 – 20:45 Mon. & Wed.|
|Short Overview||The Certified Ethical Hacker (CEH) program is the most comprehensive ethical hacking course to help information security professionals grasp the fundamentals of ethical hacking. The hacking course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit. This hacking course helps you assess the security posture of an organization by identifying vulnerabilities in the network and system infrastructure to determine if unauthorized access is possible. The CEH is the first of a series of 3 comprehensive courses (CEH, ECSA and the APT course) to help a cyber security professional master penetration testing.|
|Program||· Introduction to Ethical Hacking
· Footprinting and Reconnaissance
· Scanning Networks
· Vulnerability Analysis
· System Hacking
· Malware Threats
· Social Engineering
· Session Hijacking
· Evading IDS, Firewalls, and Honeypots
· Hacking Web Servers
· Hacking Web Applications
· SQL Injection
· Hacking Wireless Networks
· Hacking Mobile Platforms
· IoT Hacking
· Cloud Computing
|Target audience||The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.|
|Competencies for the target audience||Strong knowledge of networking, and computer systems.
Understanding of current security protocols for regularly used operating systems like, Linux, Windows, and Mac.
Ability to hack into network or systems on permission, to assess vulnerabilities.
Able to perform preventive, corrective and protective countermeasures against malicious attempts.
Should be proficient in identifying and cracking multiple types of passwords.
Know the phases and methodologies of ethical hacking.
Should know how to erase digital evidence of networks and system intrusions.
Understand encryption techniques and cryptography.
Adhere to the code of ethics and perform hack under professional conduct.
Should be aware of common cyberattacks like phishing, social engineering, trojans, insider attacks, identity thefts, etc., and should know how to undertake appropriate evasion techniques and countermeasures.
|Short bio||Goran Milev, currently Security Solution Manager at Integra Solution and trainer with vast experience and certifications in the field including Certified EC-Council Instructor and many others.
LinkedIn Profile: shorturl.at/hnAJP