Description
£811.00
The Certified Ethical Hacker(CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities.
Description
About this course
The Certified Ethical Hacker(CEH) training course enables students to identify, counter and defend hackers from penetrating networks and gaining access to vital information. This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding an average salary of over £64,000 per year. This course is also the prerequisite for the
CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.
Training Solution Breakdown
- Intuitive and rewarding online training resources
- Comprehensive Freephone or email support
- 24/7 access to training materials
- Study anytime, anywhere in a world for a flexible learning experience
- 12 months unrestricted access
- Access to online training options
- Progress reviews & comprehensive assessments to ensure efficient understanding of course content
- Career advice and CV support once training has been completed
Buy this course today and take control of your career and enhance your prospects.
CEH Breakdown
-
1.0 Intro
- Pretest Intro
- Questions
- Pretest Summary
- Intro to Ethical Hacking
- 2.0 Footprinting & Reconnaissance
- 3.0 Scanning Networks
- 4.0 Enumeration
- 5.0 System Hacking
- 6.0 Trojans & Backdoors
- 7.0 Viruses & Worms
- 8.0 Denial of Service
- 9.0 Social Engineering
- 10.0 Sniffers
- 11.0 Session Hijacking
- 12.0 Hacking Web Servers
- 13.0 Web Application Vulnerabilities
- 14.0 SQL Injection
- 15.0 Hacking Wireless Networks
- 16.0 Evading IDS, Firewalls & Honeypots
- 17.0 Buffer Overflows
- 18.0 Cryptography & Steganography
-
19.0 Metasploit for Penetration Testing
- Business Process
- Lab Suggestions
For more information, contact one of our course advisors
No additional materials are required for this course.
For more information, contact one of our course advisors