Course Description
This official ethical hacking training introduces students to an interactive environment where they learn to scan, test, hack, and secure their systems. Course highlights include:
- Foot-printing tools and countermeasures
- Network scanning techniques and countermeasures
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Trojan types, analysis, and countermeasures
- Viruses, worms, malware analysis, and countermeasures
- Packet sniffing techniques and defense strategies
- Social Engineering techniques, identity theft, and countermeasures
- DoS/DDoS attack techniques, botnets, and countermeasures
- Web server and web application attacks
- SQL injection attacks and Wireless Encryption
- Mobile platform attack vectors and Android vulnerabilities
- Cloud computing concepts, threats, attacks, and security techniques
- Cryptography ciphers, Public Key Infrastructure (PKI), attacks, and cryptanalysis tools
- Threats to IoT platforms and defense strategies
- IT professionals can gain insight into the hacker mindset, take preventive measures, and secure systems, devices, and networks.
- Understanding the exploit lifecycle and its implications for security
A CEH certification can serve as a foundation for advanced IT security certification courses, such as penetration testing, audit certifications, and forensics. In today's interconnected digital world, the demand for CEH professionals is high as companies seek to prevent data breach losses.
What will I learn?
- Official EC-Council CEH v10 course materials, accredited by GCHQ
- uSkill certification of participation
- Money-back guarantee after 16 hours of classes if unsatisfied
- Certified instructor-led CEH exam preparation
- EC-Council CEH v10 exam (included)
- Access to practical lab environments
Course curriculum
click to download