(+1) 418-261-7460
20 Rue St-Nicolas, Québec, QC, G1K 6T2, Canada
info@captosec.com
CAPTOSEC, Inc.CAPTOSEC, Inc.

CEH training

Certification Certified Ethical Hacker

EC Council (European Council)

This course offers rapid but rigorous preparation for the European Council's Certified Ethical Hacker (CEH®) exam. Participants will learn how to evaluate, test and penetrate their own systems. Through a series of practical exercises, they will acquire an in-depth knowledge of security systems. Participants will start by learning how perimeter defence works, and then learn how to attack in order to validate the security of their own networks without causing any real damage. The course enables participants to analyse the various stages of an intrusion, from recognition to escalation of privileges, and to identify the steps they need to take to ensure the security of their environment. Topics covered include intrusion detection, process creation, social engineering, DDoS attacks, buffer overflows and virus creation. By the time participants have completed the 5-day course, they will have experienced the whole concept of ethical hacking.

The purpose of CEH certification is to:

A propos de l’examen

  • Number of questions: 125
  • Test duration: 4 Hours
  • Test format: Multiple choice
  • Test delivery: ECC EXAM, VUE
  • Examination number: 312-50 (ECC EXAM), 312-50 (VUE

Duration

42h

On-line

Via Zoom

In video

Self-training

At your own pace

Prerequisites

Information security
70%
TCPI/IP
80%
Linux base
30%

Objectives

Programme

  • Module 0 - Introduction to EC-Council
  • Module 1 - Introduction to hacking
  • Module 2 – Footprinting and recognition
  • Module 3 – Network Scanning
  • Module 4 – Systems Enumeration
  • Module 5 – Information Systems Hacking
  • Module 6 – Trojans Horses and Backdoors
  • Module 7 – Viruses and Worms
  • Module 8 – Sniffers
  • Module 9 – Social Engineering
  • Module 10 – Denial of Service Attacks (DoS)
  • Module 11 – Session Hacking (Hijacking)
  • Module 12 – Web Server Hijacking
  • Module 13 – Web Application Hacking
  • Module 14 – SQL Injection
  • Module 15 – Wireless Networks Hacking
  • Module 16 – Mobile Platforms Hacking
  • Module 17 – Parade for IDS, firewall and Honeypots
  • Module 18 – Buffer Overflow
  • Module 19 – Cryptography
  • Module 20 – Intrusion tests
Contact us

Besoin de plus d’information? Exprimez vous

en_USEN
Cookie Consent Banner by Real Cookie Banner