Cyber Security Certified Ethical Hacker v9

Certified Ethical Hacker v9

Location:

Date of Class:

Instructor:

Last Day To Enroll:

3250.00 3,250.00
$3,250.00
PRICE PER USER
$
X
USERS


=
SUBTOTAL
$
  • Course Delivery: Virtual Classroom

Chat Live | Contact Us | Toll Free: (888) 360-8764

 

Description

The Certified Ethical Hacker program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As we put it, “To beat a hacker, you need to think like a hacker”. This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

This is the worlds most advanced ethical hacking course with 18 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organization. In 18 comprehensive modules, the course covers 270 attack technologies, commonly used by hackers.  Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world.

 

Course Objectives

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • System hacking methodology, steganography, steganalysis
attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan
countermeasures
  • Working of viruses, virus analysis, computer worms, malware
analysis procedure, and countermeasures
  • Packet sning techniques and how to defend against sning
  • Social Engineering techniques, identify theft, and social
  • engineering countermeasures
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and
DoS/DDoS countermeasures
  • Various types of footprinting, footprinting tools, and
countermeasures
  • Enumeration techniques and enumeration countermeasures
  • Network scanning techniques and scanning countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and
  • countermeasures
Different types of web application attacks, web application
hacking methodology, and countermeasures
  • Wireless Encryption, wireless hacking methodology, wireless
hacking tools, and wi- security tools
  • Mobile platform attack vector, android vulnerabilities, jailbreaking
iOS, windows phone 8 vulnerabilities, mobile security guidelines,
and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and
countermeasures
  • Various cloud computing concepts, threats, attacks, and security
techniques and tools
  • Different types of cryptography ciphers, Public Key Infrastructure
(PKI), cryptography attacks, and cryptanalysis tools
  • Various types of penetration testing, security audit, vulnerability
assessment, and penetration testing roadmap
  • SQL injection attacks and injection detection tools
 

Topics Covered

  • Introduction to Ethical Hacking
  • Footprinting and Reconnaissance
  • Scanning Networks
  • Enumeration
  • System Hacking
  • Malware Threats
  • Sniffing
  • Social Engineering
  • Denial of Service
  • Session Hijacking
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Web servers
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls and Honeypots
  • Cloud Computing
  • Crypthography

 

Subject Matter Expert

NA

Got questions? Contact us below or call 877-881-2235

Why Choose 360training.com?

  • Fast and easy courses completion
  • Get an education faster than at traditional colleges!
  • 100% online - No classroom attendance required.
  • Unlimited 24x7 online customer support
  • Over 500,000+ certified nationwide.