Course Duration in Hours
60
60
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.
Module 01: Introduction to Ethical Hacking
Module 02: System Fundamentals
Module 03: Cryptography
Module 04: Footprinting
Module 05: Scanning
Module 06: Enumeration
Module 07: System Hacking
Module 08: Malware
Module 09: Sniffers
Module 10: Social Engineering
Module 11: Denial of Service
Module 12: Session Hijacking
Module 13: Web Servers and Applications
Module 14: SQL Injection
Module 15: Hacking Wi-Fi and Bluetooth
Module 16: Mobile Device Security
Module 17: Evasion
Module 19: Cloud Technologies and Security
Module 20: Physical Security
Benefits of Attendance:
Upon completion of this course, students will be able to: Understand how intruders escalate privileges. Understand Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. Understand Ethical Hacking. Understanding Security Measures in Unix / Linux / Windows environment
10+2 Pass with basic knowledge of computer
AEM Kolkata, Gariahat Road (Kolkata),Kolkata,IN