Certified Ethical Hacker (CEH)

Cas Training > Nuestros cursos > Certified Ethical Hacker (CEH)
Icono Duración del curso
Duración del curso
5 días
Lugar de impartición
Madrid / Online
Icono modalidad del curso
Modalidad
Presencial|Virtual
Icono Fecha del curso
Fecha de inicio
Próximamente

Acerca del curso

Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in a 5 day hands on class by our Certified EC-Council Instructor.

The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Próximas convocatorias

Estamos preparando nuevas convocatorias. Déjanos tus datos a través del formulario y te avisaremos lo antes posible.

Objetivos

  • Key issues plaguing the information security world, incident management processes, and penetration testing
  • Footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and the processes involved in covering tracks
  • Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Packet sniffing techniques and how to defend against sniffing
  • Social engineering techniques, identify theft, and social engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
  • Session hijacking techniques and countermeasures
  • Webserver attacks, attack methodology, and countermeasures
  • Web application attacks, web application hacking methodology, and countermeasures
  • SQL injection attacks and injection detection tools
  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools
  • Mobile platform attack vectors, android vulnerabilities, mobile security guidelines, and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
  • Cloud computing concepts, threats, attacks, and security techniques and tools
  • Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
  • Penetration testing, security audit, vulnerability assessment, and the penetration testing roadmap
  • Vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems
  • Threats to IoT platforms and how to defend IoT devices
  • Contenidos

    Module 01: Introduction to Ethical Hacking
    Module 02: Footprinting and Reconnaissance
    Module 03: Scanning Networks
    Module 04: Enumeration
    Module 05: Vulnerability Analysis
    Module 06: System Hacking
    Module 07: Malware Threats
    Module 08: Sniffing
    Module 09: Social Engineering
    Module 10: Denial-of-Service
    Module 11: Session Hijacking
    Module 12: Evading IDS, Firewalls, and Honeypots
    Module 13: Hacking Web Servers
    Module 14: Hacking Web Applications
    Module 15: SQL Injection
    Module 16: Hacking Wireless Networks
    Module 17: Hacking Mobile Platforms
    Module 18: IoT Hacking
    Module 19: Cloud Computing
    Module 20: Cryptography

    Compartir:

    Solicita más información

    Solicitar Información
    Mensaje enviado correctamente
    No se ha enviado su mensaje. Por favor revisa los campos e inténtalo otra vez.