Warning: Cannot modify header information - headers already sent by (output started at /home4/linuxsol/public_html/certified-ethical-hacker-v9.php:7) in /home4/linuxsol/public_html/head.php on line 758
loader

Certified Ethical Hacker

ceh_banner


ceh-center-text

Introduction

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

Course Objective

  • Understand a variety of hacking attacks and threats to the cloud computing technology
  • Specify various remedies to encounter cloud computing attacks
  • Understand in-depth pen testing techniques to identify threats in cloud systems
  • Explore Heart bleed CVE-2014-0160, Shellshock CVE-2014-6271 and
       Poodle CVE-2014-3566
  • Explore how to hack using mobile phones
  • Learn about latest virus, Trojan and Back doors
  • Understand information security controls, laws and standards

Prerequisites

  • Before attending this course, students should have one year of
      experience managing Windows/Unix/Linux systems or have equivalent
      knowledge and skills.
  • Good Understanding of TCP/IP is required.
  • It is recommended that candidate should have knowledge of Linux
      based Operating System.

Downloads

CEH Brochure:

Download

Syllabus

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Cloud Computing
  • Cryptography

Related Courses

  • RHCE

    A Red Hat® Certified Engineer (RHCE®) is a Red Hat Certified System Administrator (RHCSA) who possesses the additional skills, knowledge, and abilities required of a senior system administrator responsible for Red Hat Enterprise Linux® systems.
    Read More
  • LSCLU (Linux Solution Certified Linux User)

    Linux Essentials of Linux OS is for people new to Linux and who want to achieve maximum productivity at home or at workplace using Linux Command-line Utilities and Desktop-based office application suites for common office productivity tasks. The course covers the methods of using Linux Shell and the desktop GUI interface (KDE & GNOME) and office productivity applications for traditional desktop tasks such as word processing, spreadsheet creation, internet access and demonstrates the ability to comfortably share work across platforms. The course is offered on the latest version of Linux OS.
    Read More
  • LSCLU (Linux Solution Certified Linux User)

    Linux Essentials of Linux OS is for people new to Linux and who want to achieve maximum productivity at home or at workplace using Linux Command-line Utilities and Desktop-based office application suites for common office productivity tasks. The course covers the methods of using Linux Shell and the desktop GUI interface (KDE & GNOME) and office productivity applications for traditional desktop tasks such as word processing, spreadsheet creation, internet access and demonstrates the ability to comfortably share work across platforms. The course is offered on the latest version of Linux OS.
    Read More

Enquire Now