fbpx

Cursus Certified Ethical Hacker

De cursus Certified Ethical Hacker behandelt de grondbeginselen van informatie beveiliging, de principes van ethisch hacken, relevante wetten en standaard procedures. Na afloop kan men zich certificeren tot Certified Ethical Hacker door examen te doen.

Regio:
  • Inhoud
  • Training
  • Modules
  • Algemeen
    Algemeen
  • Reviews
  • Certificaat
  • Cursus Certified Ethical Hacker : Inhoud

    Foot Printing and Reconnaissance

    Learn to use the latest techniques to perform foot printing and reconnaissance, a critical phase of the ethical hacking process.

    Scanning Networks

    Learn network scanning techniques. Learn various enumeration techniques, such as BGP and NFS exploits.

    System Hacking

    Learn system hacking methodologies like steganography, steganalysis attacks and tracks—used to discover vulnerabilities.

    Malware Threats

    Learn different types of malware (Trojan, virus, etc.), APT and fileless malware, malware analysis procedure.

    Sniffing

    Learn using packet-sniffing techniques to discover network vulnerabilities, and to defend against sniffing attacks.

    Social Engineering

    Learn social engineering techniques, including identifying theft attempts and audit human-level vulnerabilities.

    Denial-of-Service

    Learn about different Denial of Service attack techniques, as well as the tools used to audit and protect a target.

    Session Hijacking and SQL Injection

    Understand session hijacking techniques to discover network-level session management and SQL Injection attacks.

    Evading IDS, Firewalls, and Cryptography

    Get introduced to firewall, intrusion detection system (IDS), and cryptography attacks.

    Hacking Web Servers

    Learn about web server attacks, including attack methodology used to audit vulnerabilities in web server infrastructures.

    Hacking Wireless Networks

    Understand different types of wireless technologies, including encryption and Wi-Fi sedcurity tools.

    Hacking Mobile Platforms and IoT

    Learn Mobile platform attack vector, IoT and OT attacks, mobile device management and mobile security guidelines.

    Cloud Computing

    Learn cloud computing concepts and threats, attacks, hacking methodology and cloud security techniques and tools.

  • Cursus Certified Ethical Hacker : Training

    Doelgroep Cursus Certified Ethical Hacker

    De cursus Certified Ethical Hacker is bedoeld voor aanstaande cybersecurity professionals die technieken willen leren om zwakheden in systemen te vinden voordat criminelen dat doen.

    Voorkennis Cursus Certified Ethical Hacker

    Algemene kennis van computer systemen en security problemen is voldoende.

    Uitvoering Training Certified Ethical Hacker

    In de cursus leren de deelnemers door middel van hands-on exercises de tools en technieken om netwerken en systemen te onderzoeken op beveiligingsproblemen.

    Certificering cursus Certified Ethical Hacker

    De deelnemers krijgen na het goed doorlopen van de training een certificaat van deelname aan de cursus Certified Ethical Hacker. De cursus sluit aan op de vereisten voor het Certified Ethical Hacker examen van het EC-Council. Na afloop kan men met de opgedane kennis dit examen behalen.

    Certified Ethical Hacker
  • Cursus Certified Ethical Hacker : Modules

    Module 1 : Intro Ethical Hacking

    Module 2 : Foot Prints

    Module 3 : Scanning Networks

    Fundamental Security Issues
    Ethical Hacking Basics
    Laws and Standard Procedures
    Foot Printing Techniques
    Reconnaissance Techniques
    Pre-attack Phase
    Network Scanning
    Determining Device State
    Countermeasures

    Module 4 : Enumeration

    Module 5 : Vulnerability Analysis

    Module 6 : System Hacking

    Enumeration Techniques
    Border Gateway Protocol
    Network File Sharing
    Security Loopholes
    Vulnerability assessment
    Assessment Tools
    Hacking Methodologies
    Steganography Attacks
    Steganalysis Attacks

    Module 7 : Malware Threats

    Module 8 : Sniffing

    Module 9 : Social Engineering

    Malware Threats
    Malware Analysis
    Malware Countermeasures.
    Packet-sniffing Techniques
    Discover Network Vulnerabilities
    Countermeasures Sniffing Attacks.
    Social Engineering Techniques
    Identify Theft Attempts
    Human-level Vulnerabilities

    Module 10 : Denial-of-Service

    Module 11 : Session Hijacking

    Module 12 : Evading IDS and Firewalls

    Denial of Service (DoS)
    Distributed DoS (DDos)
    Countermeasures and Protections
    Session Hijacking Techniques
    Authentication and Authorization
    Cryptographic Weaknesses
    Intrusion Detection System (IDS)
    Honeypot Evasion Techniques
    Perimeter for Weaknesses

    Module 13 : Hacking Web Servers

    Module 14 : Hacking Web Apps

    Module 15 : SQL Injection

    Web Server Attacks
    Attack Methodology
    Audit Vulnerabilities
    Web Application Attacks
    Vulnerabilities Web Apps
    Countermeasures
    SQL Injection Attacks
    Evasion Techniques
    Injection Countermeasures.

    Module 16 : Hacking Wireless

    Module 17 : Hacking Mobile Platforms

    Module 18 : IoT Hacking

    Wireless Technologies
    Encryption Threats
    Wi-Fi Security Tools
    Mobile Attack vector
    Android and iOS Hacking
    Mobile Security Guidelines
    IoT and OT attacks
    Hacking Methodology
    Hacking tools

    Module 19 : Cloud Computing

    Module 20 : Cryptography

    Container Technologies
    Server Less Computing
    Cloud Computing Threats
    Encryption Algorithms
    Cryptography Tools
    Cryptography Attacks
  • Cursus Certified Ethical Hacker : Algemeen

    Lees de algemene cursus informatie
  • Cursus Certified Ethical Hacker : Reviews

  • Cursus Certified Ethical Hacker : Certificaat