Duration: 5 Days
If you’re concerned about the integrity of your network’s infrastructure, the Certified Ethical Hacker v9 course will teach you the ethical hacking tools and techniques needed to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. By scanning and attacking your own network (no real networks will be harmed), you’ll also learn how intruders operate and the steps to secure a system.
In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation. In addition to learning how to scan, test, hack, and secure a system, you’ll prepare for the latest Certified Ethical Hacker exam from EC-Council.
Highlights of Certified Ethical Hacker v9 include understanding the five phases of ethical hacking:
The Certified Ethical Hacker v9 course will be of interest to:
Individuals concerned about the integrity of the network infrastructure
Upon successful completion of the education and examination components related to this qualification, candidates can expect to gain competencies in the following:
Webserver and web application attacks and countermeasures
SQL Injection Attacks
Cloud Computing Threats
Candidates for this course must have at least two years of IT security experience and a strong working knowledge of TCP/ICP.
Upon completion of this 5-day Certified Ethical Hacker v9 course, participants will be prepared to complete the CEH certification. An exam voucher is included with your course registration; however, the exam will not be administered in class to allow for maximum discussion opportunities and hands-on activities.