Certified Ethical Hacker - CEH
Certificate
In Pune
Description
-
Type
Certificate
-
Location
Pune
-
Class hours
40h
Candidates will study how to hack assault computer & network, & how to defend system from such attack. Both MS Window & Linux platform would be use in the teaching. Candidates will execute many hands on laboratory, both attack and defend, use port scanned, foot print, exploits Windows & Linux susceptibility, buffer spill over develop, S.Q.L. insertion, privilege escalation, Trojan, & backdoor. Suitable for: This program is for those who want to acquire knowledge on Hacking. This program will considerably advantage security officer, auditor, security experts, site administrator, & those who are interested in the honesty of the network manufacturing.
Facilities
Location
Start date
Start date
Reviews
Teachers and trainers (1)
Faculy - 1 Faculty - 1
Lead Faculty
CEH Certified, Cyber Crime Investigator, RHCE Certified. Has hands-on experience in IT Security and Cyber crime investigations
Course programme
C.E.H.: This course is the main and standard Ethical Hacking exercise course in this globe.
The session will plunge the candidates into inter-active surroundings where they will be revealed how to scanned, analysis, hack & protect their personal system.
The laboratory rigorous surroundings provide every candidate in depth information & sensible knowledge with the present necessary security system. Candidates will start by consider how perimeters resist work & then be guide into scan & attack their individual network, no genuine network is debilitated.
Candidates then study how intruder raise privilege & what step can be taken to safe a system. Candidates will also study about interruption revealing, Policy formation, Social Engg., D.D.oS. assault, Buffer Overflow & Virus formation.
When a candidate do this teaching , they will have hand on considering & understand in Ethical Hack.
This program offers student E.C.Council Ethical Hacker certificate exam 312 50.
Syllabus :
* Intro. to Ethical Hacking
* Foot prints & Reconnaissance
* Scan Network
* Enumeration
* System Hack
* Trojan & Back Door
* Virus & Worm
* Sniffer
* Social Engg.
* Denial Of Service
* Session Hijack
* Hack Web servers
* Hack Web Apps.
* S.Q.L. Injection
* Hack Wireless Network
* Evade I.D., Firewall & Honey pots
* Buffer overflow
* Cryptography
* Penetration Test
Certified Ethical Hacker - CEH