Certfied Ethical Hacker v10

Formations Certfied Ethical Hacker v10

OBJECTIF

The Certified Ethical Hacker (CEHv10) is a Recognized and Respected Training, Since its inception in 2003, the Certified Ethical Hacker is widely distributed worldwide, it is a respected and accredited certification in accordance with ANSI 17024, which adds credibility and value to certified members. The course is now in its 10th version, it has been updated to bring you the tools and techniques used by hackers and security professionals, likely to penetrate any information system. This course will immerse you in the "state of mind of Hacker" in order to teach you to think like a pirate to better defend yourself. targeted system. The course covers the Five Phases of Ethical Hacking: Recon-birth, Obtaining Access, Enumeration, Maintaining Access and Disappearing Traces. The tools and techniques of each of these 5 phases will be presented during the training.

In particular, the objectives of the training are as follows:

  • will help master an ethical hacking methodology
  • Reinforce ethical piracy as a unique and self-regulating profession.

PREREQUISITES

• Professional knowledge of TCP / IP, Linux and Windows Server

GENERAL INFORMATION

• Code : CEH
• Duration : 5 Days
• schedule : 8h30 - 17h30
• place : training center, Center Urbain Nord

TARGETED AUDIENCE

  • • Security Officers
  • • Audience
  • • Security Professionals
  • • Site Administrators
  • • Anyone concerned with IS stability

RESOURCES

• Course materials
• 40% demonstration
• 40% of theory
• 20% practical exercises

PROGRAM OF TRAINING

  • Lesson Plan
    1. • Introduction to Ethical Hacking

      • Footprinting and Reconnaissance

      • Scanning Networks

      • Enumeration

      • Vulnerability Analysis

      • System Hacking

      • Malware Threats

      • Sniffing

      • Social Engineering

      •Denial-of-Service

      •Session Hijackinge

      •Evading IDS, Firewalls, and Honeypots

      •Hacking Web Servers

      •Hacking Web Applications

      •SQL Injection

      •Hacking Wireless Networks

      •Hacking Mobile Platforms

      •IoT Hacking

      •Cloud Computing

      •Cryptography

Do not hesitate to contact our experts for any additional information, study and free calculation of an audit service.