phone  +234 806 719 1062      mailinfo@mitiget.com

CEH – Certified Ethical Hacker v10 Training

Course Overview

The EC-Council Certified Ethical Hacker training certifies a security professional as an Ethical Hacker and Penetration Tester. An Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s).

The Certified Ethical Hacker (CEH v10) training & certification course is one of the most trusted and desired information security training programs. The CEH training immerses you into the Hacker Mindset because to master the hacking technologies, you will need to become one, but an ethical one! The course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As always put in the industry, “To beat a hacker, you need to think like a hacker”.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Now in its 10th iteration, the training course has been updated with current technologies like Internet of Things (IoT) and artificial intelligence (AI). The training course equips you with the skillset needed to guard against the weaknesses and vulnerabilities of network infrastructure and illegal hacking. The CEH training course now provides an option to challenge a practical exam in addition to the regular exam to put the skills acquired into practice, earning the CEH (Practical) credential. This credential validates your practical skills for industry readiness.

 

Who Should Attend this Training Course?

CEH training is beneficial for the following professionals:

  • Ethical hackers
  • System Administrators
  • Network Administrators and Engineers
  • Auditors & Security Professionals
  • Network Security Professionals
  • Site Administrators
  • Security Officers
  • Anyone else entrusted with the responsibility of safeguarding the integrity of the network infrastructure

 

Benefits and Main Purpose of Course

  • Establish and govern minimum standards for credentialing professional information security specialists in ethical hacking measures.
  • Inform the public that credentialed individuals meet or exceed the minimum standards.
  • Reinforce ethical hacking as a unique and self-regulating profession.

 

Course Prerequisites

  • Basic knowledge of Networking
  • Knowledge of server and network components

 

Course Outline

  • Various types of footprinting, footprinting tools, and countermeasures.
  • Network scanning techniques and scanning countermeasures.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Working with viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Packet sniffing techniques and how to defend against sniffing.
  • Social Engineering techniques, identify theft, and social engineering countermeasures.
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Different types of webserver & web application attacks.
  • SQL injection attacks & Wireless Encryption.
  • Mobile platform attack vector & android vulnerabilities
  • Various cloud computing concepts, threats, attacks, and security techniques and tools.
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Different threats to IoT platforms and to defend IoT devices securely.

 

Schedule & Prices

Duration & Course Fee

Schedule

Live Virtual Classroom (Instructor-Led)

Duration: 5 Days

Fee: Request for cost

August

 

03-07

October

 

05-09

December

 

01-05

 

Location: Lagos, Nigeria

 

Contact us today to book your course through: info@mitiget.com, +234 909 552 2003, +2348067191062


Return to Training Options


 

We are open for orders. Purchase your professional tool-kits and resources today. Click here Dismiss