CEH (V10) - Certified Ethical Hacker Training
Course
Online
Description
-
Type
Course
-
Level
Intermediate
-
Methodology
Online
-
Duration
Flexible
-
Start date
Different dates available
-
Online campus
Yes
-
Delivery of study materials
Yes
-
Support service
Yes
-
Virtual classes
Yes
The CEH (v10) has updated the modules from CEH (v9) on various important aspects of Cybersecurity- Vulnerability analysis, IoT devices, Attack vectors and Malware analysis. There is also added emphasis on penetration testing tools. Throughout the course, you’ll essentially use the same techniques that the “bad guys” use, including social engineering practices and even evaluating physical security to gain access. Gain knowledge in the methodologies that hackers actually use to infiltrate networks and devices; i.e., writing virus codes, and reverse engineering, etc. You will learn to perform vulnerability analysis to identify security loopholes in the networks, communication infrastructure, and end systems.
In addition to the updated modules; there is also the launch of:
The STORM, a mobile security toolkit (Mobile platform attack vector, Android vulnerabilities, Mobile security guidelines, and tools).
The CEH practical, which tests the candidate’s practical skills in applying the Ethical Hacking techniques in 20 real-life situations.
Please note that Greycampus is an EC Council Authorized Training Center across North America, and uses official EC Council courseware for training delivery.
Facilities
Location
Start date
Start date
About this course
Deeper understanding in the application of vulnerability analysis. Learn about emerging attack vectors on cloud, Machine learning. Be adept at securing networks and systems
Deeper understanding in the application of vulnerability analysis. Learn about emerging attack vectors on cloud, Machine learning. Be adept at securing networks and systems
Reviews
Subjects
- Networks
- Hacker
- Hacking
- Systems
- Engineering
- WHOIS
- Lookups
- DNS
- Countermeasures
- Footprinting
Course programme
Footprinting, Reconnaissance
Learn footprinting techniques like WHOIS lookups, DNS information and email footprinting, and how to use tools like Maltego and Recon-ng for footprinting and reconnaissance. Also learn about footprinting countermeasures to implement
Scanning NetworksLearn how to scan and check for live systems, open ports, and vulnerabilities using proxies and anonymizers.
EnumerationLearn the tools and techniques for NetBIOS, SNMP, LDAP, NTP, and SMTP enumeration, and the countermeasures for enumeration.
System HackingLearn a stepwise process to hack systems - password cracking, privilege escalation, executing applications, and installing spyware on the target system. Additionally learn about Rootkits, Steganography, and about covering your tracks after a hacking attempt.
Malware ThreatsLearn about malware - trojans, viruses and worms - and how to detect and analyze malware. You’ll also learn about countermeasures and anti-malware software that can be used to secure a system.
CEH (V10) - Certified Ethical Hacker Training