CEH v13 AI: Certified Ethical Hacker
LOCATION | November | December | January | February |
---|---|---|---|---|
Auckland | ||||
Hamilton | ||||
Christchurch | ||||
Wellington | ||||
Virtual Class |
The Certified Ethical Hacker® v12 training program includes 20 modules covering various technologies, tactics, and procedures, providing prospective ethical hackers with the core knowledge needed to thrive in cybersecurity. Delivered through a carefully curated training plan that typically spans five days, the 12th version of the C|EH® continues to evolve to keep up with the latest OS, exploits, tools, and techniques. The concepts covered in the training program are split 50/50 between knowledge-based training and hands-on application through our cyber range. Every tactic discussed in training is backed by step-by-step labs conducted in a virtualized environment with live targets, live tools, and vulnerable systems. Through our lab technology, every participant will have comprehensive hands-on practice to learn and apply their knowledge.
This course will significantly benefit security officers, auditors, security professionals, site administrators, security analysts, network security engineers, information security professionals and anyone who is concerned about the integrity of the network infrastructure.
- Networking experience
- Some Linux experience is beneficial as Linux command line will be covered in the course
- ICND1 or equivalent skills
- Windows Server Experience
- TCP/UDP/IP experience
- Experience with virtual machines
After attending this course:
- Students are able to apply countermeasures to secure systems against threats and attacks
- Students are able to test access to organizational data using ethical hacking techniques
- Students are able to implement real-world hacking techniques to test the security of systems
- Students are able to employ complex tools to identify and analyze risks and weaknesses
- Students are able to uncover vulnerabilities in a network infrastructure and determine appropriate countermeasures
- Introduction to Ethical Hacking
- Foot Printing and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT Hacking
- Cloud Computing
- Cryptography