Certified Ethical Hacker - CEH

Akandum Technologies
In Pune

Price on request
You can also call the Study Centre
91589... More

Important information

Typology Certificate
Location Pune
Class hours 40h
  • Certificate
  • Pune
  • 40h

Candidates will study how to hack assault computer & network, & how to defend system from such attack. Both MS Window & Linux platform would be use in the teaching. Candidates will execute many hands on laboratory, both attack and defend, use port scanned, foot print, exploits Windows & Linux susceptibility, buffer spill over develop, S.Q.L. insertion, privilege escalation, Trojan, & backdoor.
Suitable for: This program is for those who want to acquire knowledge on Hacking. This program will considerably advantage security officer, auditor, security experts, site administrator, & those who are interested in the honesty of the network manufacturing.

Where and when
Starts Location
On request
Office 5, 4 Floor, Gunjal Complex, Deccan Gymkhana, 411004, Maharashtra, India
See map
Starts On request
Office 5, 4 Floor, Gunjal Complex, Deccan Gymkhana, 411004, Maharashtra, India
See map

Teachers and trainers (1)

Faculy - 1 Faculty - 1
Faculy - 1 Faculty - 1
Lead Faculty

CEH Certified, Cyber Crime Investigator, RHCE Certified. Has hands-on experience in IT Security and Cyber crime investigations

Course programme

C.E.H.: This course is the main and standard Ethical Hacking exercise course in this globe.

The session will plunge the candidates into inter-active surroundings where they will be revealed how to scanned, analysis, hack & protect their personal system.

The laboratory rigorous surroundings provide every candidate in depth information & sensible knowledge with the present necessary security system. Candidates will start by consider how perimeters resist work & then be guide into scan & attack their individual network, no genuine network is debilitated.

Candidates then study how intruder raise privilege & what step can be taken to safe a system. Candidates will also study about interruption revealing, Policy formation, Social Engg., D.D.oS. assault, Buffer Overflow & Virus formation.

When a candidate do this teaching , they will have hand on considering & understand in Ethical Hack.

This program offers student E.C.Council Ethical Hacker certificate exam 312 50.

Syllabus :

* Intro. to Ethical Hacking
* Foot prints & Reconnaissance
* Scan Network
* Enumeration
* System Hack
* Trojan & Back Door
* Virus & Worm
* Sniffer
* Social Engg.
* Denial Of Service
* Session Hijack
* Hack Web servers
* Hack Web Apps.
* S.Q.L. Injection
* Hack Wireless Network
* Evade I.D., Firewall & Honey pots
* Buffer overflow
* Cryptography
* Penetration Test

Students that were interested in this course also looked at...
See all