Join over 35,000 students, from 300 countries, who already obtained their computer training with us.
Duration: 5 Days
Registration Open Now!
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s)
Our hacking courses takes place in a lab environment, giving you in-depth knowledge of the subject, along with practical experience in the current essential security systems. Topics covered include Ethical Hacking, Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed within the organization and who can be trusted to undertake an attempt to penetrate networks and/or computer systems using the same methods and techniques as a Hacker
Our CEH courses will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Lesson 1: Introduction to Ethical Hacking
Lesson 2: Hacking Laws
Lesson 3: Footprinting
Lesson 4: Google Hacking
Lesson 5: Scanning
Lesson 6: Enumeration
Lesson 7: System Hacking
Lesson 8: Trojans and Backdoors
Lesson 9: Viruses and Worms
Lesson 10: Sniffers
Lesson 11: Social Engineering (DVD)
Lesson 12: Phishing (DVD)
Lesson 13: Hacking Email Accounts (DVD)
Lesson 14: Denial-of-Service
Lesson 15: Session Hijacking
Lesson 16: Hacking Web Servers
Lesson 17: Web Application Vulnerabilities
Lesson 18: Web-Based Password Cracking Techniques
Lesson 19: SQL Injection
Lesson 20: Hacking Wireless Networks
Lesson 21: Physical Security (DVD)
Lesson 22: Linux Hacking
Lesson 23: Evading IDS, Firewalls and Detecting Honey Pots
Lesson 24: Buffer Overflows
Lesson 25: Cryptography