________________________________________________________________
Do you want to take this course remotely or in person?
Contact us by email: info@nanforiberica.com , phone: +34 91 031 66 78, WhatsApp: +34 685 60 05 91 , or contact Our Offices
________________________________________________________________
Course Description: Certified Ethical Hacker (CEH)
This course is taught in online mode and consists of 10 units.
The duration of the course is distributed between content and collaboration tools. Upon completion, the student will receive an accrediting diploma .
Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .
The course is taught in tele-training modality (100% bonus option) and in-person and tele-in-person training actions can also be carried out on demand.
Introduction
The objective of the training is to help you master the methodology of an Ethical Hacker , which can be used both in a penetration test and in any ethical hacking situation. Attendees, once they pass the corresponding exam, will be able to obtain one of the ethical hacking certifications of greatest global interest: Certified Ethical Hacker – CEH.
Addressed to
This course is aimed particularly at security managers, auditors, security professionals, system administrators and those interested in information systems security.
Course content
Module 01: Introduction to Ethical Hacking
Module 02: Recognition Techniques
Module 03: Network Scanning
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: Systems Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial of Services (DoS)
Module 11: Session Hijacking
Module 12: Evasion of IDS, Firewalls and Honeypots
Module 13: Web Server Hacking
Module 14: Web Application Hacking
Module 15: SQL Injection
Module 16: Wireless Network Hacking
Module 17: Hacking of Mobile Platforms
Module 18: IoT and OT Hacking
Module 19: Cloud Computing
Module 20: Cryptography
Previous requirements
No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.
Rates
If you are interested in taking this course in any training modality, contact us to request an offer .