Certified Ethical Hacker (CEH)

€0.00
| /

________________________________________________________________

¿Quiere realizar este curso en modalidad telepresencial o presencial?

Póngase en contacto con nosotros por correo: info@nanforiberica.comteléfono: +34 91 031 66 78, o WhatsApp: +34 685 60 05 91

________________________________________________________________

Course Description: Certified Ethical Hacker (CEH)

This course is taught in online mode and consists of 10 units.

The duration of the course is distributed between content and collaboration tools. Upon completion, the student will receive an accrediting diploma .

Training is done through our Virtual Campus , with this modality you will have all the didactic content on the course platform and it will be accessible, from the start day of the course, 24 hours a day, every day of the week. The student will also have participation forums , as well as a continuous tutoring .

The course is taught in tele-training modality (100% bonus option) and in-person and tele-in-person training actions can also be carried out on demand.


Introduction

The objective of the training is to help you master the methodology of an Ethical Hacker , which can be used both in a penetration test and in any ethical hacking situation. Attendees, once they pass the corresponding exam, will be able to obtain one of the ethical hacking certifications of greatest global interest: Certified Ethical Hacker – CEH.


Addressed to

This course is aimed particularly at security managers, auditors, security professionals, system administrators and those interested in information systems security.

Course content

Module 01: Introduction to Ethical Hacking

Module 02: Recognition Techniques

Module 03: Network Scanning

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: Systems Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial of Services (DoS)

Module 11: Session Hijacking

Module 12: Evasion of IDS, Firewalls and Honeypots

Module 13: Web Server Hacking

Module 14: Web Application Hacking

Module 15: SQL Injection

Module 16: Wireless Network Hacking

Module 17: Hacking of Mobile Platforms

Module 18: IoT and OT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

    Previous requirements

    No prior technical requirements are necessary to take this course. However, basic computer skills and knowledge of environments related to Information Technology are recommended.


    Rates

    If you are interested in taking this course in any training modality, contact us to request an offer .


    Information related to training

    Soporte siempre a tu lado

    Training support: Always by your side

    Formación presencial y telepresencial

    Do you need another training modality?

    bonificaciones

    Bonuses for companies