Certified Ethical Hacker (CEH) Certification Prep Boot Camp

[vc_row][vc_column][vc_single_image image=”1338″ img_size=”full”][/vc_column][/vc_row][vc_row][vc_column][vc_custom_heading text=””][/vc_column][/vc_row][vc_row][vc_column][vc_tta_tabs color=”black” active_section=”1″][vc_tta_section title=”Objectives” tab_id=”1483223407703-c6ecc678-fb77″][vc_column_text]If you’re concerned about the integrity of your network’s infrastructure, this course will teach you the ethical hacking tools and techniques needed to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. By scanning and attacking your own network (no real networks will be harmed), you’ll also learn how intruders operate and the steps to secure a system.

In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

LEARNING OUTCOMES:

  • Footprinting
  • Network scanning
  • Enumeration
  • Packet sniffing
  • Social Engineering
  • DoS/DDoS
  • Session hijacking
  • Webserver and web application attacks and countermeasures
  • SQL injection attacks
  • Wireless encryption
  • Cloud computing threats
  • Cryptography ciphers
  • Penetration testing

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Requirements” tab_id=”1483223407737-508280e7-f44b”][vc_column_text]

WHO NEEDS TO ATTEND

  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • Individuals concerned about the integrity of the network infrastructure

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Curriculum” tab_id=”1483223418481-72d39c8a-3a02″][vc_column_text]

1. Introduction to Ethical Hacking 2. Footprinting and Reconnaissance 3. Scanning Networks 4. Enumeration 5. System Hacking 6. Malware Threats 7. Sniffing 8. Social Engineering 9. Denial of Service 10. Session Hijacking 11. Hacking Webservers 12. Hacking Web Applications 13. SQL Injection 14. Hacking Wireless Networks 15. Hacking Mobile Platforms 16. Evading IDS, Firewalls, and Honeypots 17. Cloud Computing 18. Cryptography

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Who Should Apply” tab_id=”1483223423130-7f4e71a4-0ce1″][vc_column_text]

WHO NEEDS TO ATTEND

  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • Individuals concerned about the integrity of the network infrastructure

[/vc_column_text][/vc_tta_section][vc_tta_section title=”Participant Mix” tab_id=”1483223424588-ba5bef9a-70bd”][vc_column_text]Participants include:

  • Security officers
  • Auditors
  • Security professionals
  • Site administrators
  • Individuals concerned about the integrity of the network infrastructure

[/vc_column_text][/vc_tta_section][vc_tta_section title=”PDUs” tab_id=”1483223425918-fc178af1-04fe”][vc_column_text]Professional Development Units (PDUs) awarded for completion of this course is 40 PDUs[/vc_column_text][/vc_tta_section][vc_tta_section title=”Schedule Of Classes” tab_id=”1483223426926-a92a2aca-c137″][vc_column_text]See Schedule of All Classes For All Months in 2017:

CALENDAR/SCHEDULE OF CLASSES[/vc_column_text][/vc_tta_section][vc_tta_section title=”Apply + Purchase” tab_id=”1483223428241-2dc908da-ebd6″][vc_column_text]TBA[/vc_column_text][/vc_tta_section][/vc_tta_tabs][/vc_column][/vc_row]