Viện Công Nghệ Kỹ Thuật Sài Gòn - Đào tạo CNTT

Chương trình đào tạo
Trang chủ   //   Chương trình đào tạo   //   Hãng đào tạo   //  

Certified Ethical Hacking - CEH v.10

CEH v10_Ethical Hacking and Countermeasures V.10

Thời lượng: 40 giờ | Ngày khai giảng: 30/10/2018 | Ngày học: 3-5-7 - Giờ học: 18:00 - 21:00
  • This is the world’s most advanced ethical hacking course with 20 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers over 340 attack technologies, commonly used by hackers.
  • The CEH v10 contains over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.
  • As “a picture tells a thousand words”, the developers of the CEH v10 have all this and more for you in over 2200 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in 5 day hands on class by our Certified Instructor.
  • The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the globally recognized Certified Ethical Hacker certification. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

 

  • Security Officers; Auditors; Network Administrators; Firewall Administrators; Security Professionals
  • Anyone who is concerned about the integrity of the network 

 

  • Strong knowledge of TCP/IP
  • Information systems and security background
  • Minimum of 12 months of experience in networking technologies

 

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Footprinting & Reconnaissance       
  • Module 3: Scanning Networks
  • Module 4: Enumeration
  • Module 5: Vulnerability Analysis
  • Module 6: System Hacking
  • Module 7: Malware threats
  • Module 8: Sniffing
  • Module 9: Social Engineering
  • Module 10: Denial of service
  • Module 11: Session Hijacking
  • Module 12: Evading IDS, Firewalls, and Honeypots
  • Module 13: Hacking Web Servers
  • Module 14: Hacking Web Applications
  • Module 15: SQL Injection
  • Module 16: Hacking Wireless Networks
  • Module 17: Hacking Mobile Platforms
  • Module 18: IoT Hacking 
  • Module 19: Cloud computing
  • Module 20: Cryptography