— CEH

WSQ-CEH | WSQ – Certified Ethical Hacker

CEH

312-50

5 Day(s)

Instructor-Led Training

SGD $750

certified-ethical-hacker

Course Schedules

19 Dec 2022 - 23 Dec 2022
27 Feb 2023 - 03 Mar 2023
17 Apr 2023 - 21 Apr 2023
05 Jun 2023 - 09 Jun 2023
17 Oct 2022 - 21 Oct 2022

TELL YOUR FRIENDS

Course OVERVIEW

The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure. In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. Here are some critical updates of CEH v11:

  • Incorporating Parrot Security OS
  • Re-Mapped to NIST/NICE Framework
  • Enhanced Cloud Security, IoT, and OT Modules
  • Modern Malware Analysis
  • Covering the Latest Threats – Fileless Malware
  • New Lab Designs and Operating Systems
  • Increased Lab Time and Hands−on Focus
  • Industry’s Most Comprehensive Tools Library

Pre-Requisites: It is recommended for participants to be experienced in Cisco Networking, Microsoft Server
Management, Linux enterprise system, web application development and database
administration.

• Students studying in disciplines such as Information Technologies, Information Systems, Web Security & Technologies, Computer Science, and Cyber Forensics
• IT Professionals who are or specialize in Information System Security, Computer Forensics, Incidence Response, Security Officers, Auditors, Security professionals, Site and Web Administrators, and any IT professionals who are not trained in IT Security
• Anyone from the general public who is concerned with network and Internet Security
are also welcome to attend the CEH course

WHO IS THE COURSE FOR?

• Information Security Analyst / Administrator
• Information Assurance (IA) Security Officer
• Information Security Manager / Specialist
• Information Systems Security Engineer / Manager
• Information Security Professionals / Officers
• Information Security / IT Auditors
• Risk / Threat/Vulnerability Analyst
• System Administrators

ATTAINABLE SKILLS

Certified Ethical Hacker CEH v11 will teach you the latest commercial-grade hacking tools, techniques, and methodologies used by hackers and information security professionals to lawfully hack an organization.

LEARNING PATHWAY

Module 1: Introduction to Ethical Hacking

Module 2: Footprinting and Reconnaissance

Module 3: Scanning Networks

Module 4: Enumeration

Module 5: Vulnerability Analysis

Module 6: System Hacking

Module 7: Malware Threats

Module 8: Sniffing

Module 9: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Network

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking

Module 19: Cloud Computing

Module 20: Cryptography

FULL COURSE OUTLINE 👉

CEH-pricing

Related Courses

You might also be interested in these courses

computer hacking forensic investigator
CHFI | Computer Hacking Forensic Investigator v9
Certified Network Defender
CND | Certified Network Defender (CNDv2)
certified incident handler
ECIH | EC-Council Certified Incident Handler
certified penetration testing professional
CPENT | Certified Penetration Testing Professional

Have A Question?

WE'RE Here To Assist You 😊

Alternatively, you may contact us via live chat on the bottom right of your browser.

Search For A Course..