CertPREP Courseware: Certified Ethical Hacker (CEH 312-50) - Instructor Led

🔍 Click to enlarge photo

Summary

WEB PRICE: Rs16,584.91
Member price: Rs16,584.91
Qty

Please select required options above

Description

The Certified Ethical Hacker (CEH 312-50) course is a great next step for anyone who wants to look at how attackers target networks, what tools attackers use, and how these techniques can be used by ethical hackers. Topics include the basic concepts related to ethical hacking, reconnaissance techniques, system hacking phases and attack techniques, network and perimeter hacking, web application hacking occurs, wireless network hacking, and mobile platforms, IoT, and OT hacking.


The goal of this course is to provide you with all the tools you need to prepare for the Certified Ethical Hacker exam — including extensive prep tools such as quizzes, foundation topics, exam preparation tasks, exercises, and review questions — to increase your chances of passing the exam on your first try.

Duration:  5 days of training 

Audience 

An IT skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker but in a lawful and legitimate manner to assess the security posture of a target system(s).

Prerequisites 

  • Minimum 2 years’ experience in Information Security
  • Knowledge of networking, TCP/IP, and basic computer knowledge

Course objectives

Upon successful completion of this course, students should be able to:  

  • Explain basic concepts related to ethical hacking
  • Demonstrate reconnaissance techniques
  • Describe system hacking phases and attack techniques
  • Identify network and perimeter hacking
  • Explain how web application hacking occurs
  • Understand wireless network hacking
  • Describe hacking on mobile platforms, IoT, and OT hacking

Required course materials:

  • Pearson CertPREP Certified Ethical Hacker (CEH 312-50)

Training  outline

  • Lesson 1: An Introduction to Ethical Hacking
  • Lesson 2: The Technical Foundations of Hacking
  • Lesson 3: Footprinting, Reconnaissance, and Scanning
  • Lesson 4: Enumeration and System Hacking
  • Lesson 5: Social Engineering, Malware Threats, and Vulnerability Analysis
  • Lesson 6: Sniffers, Session Hijacking, and Denial of Service
  • Lesson 7: Web Server Hacking, Web Applications, and Database Attacks
  • Lesson 8: Wireless Technologies, Mobile Security, and Attacks
  • Lesson 9: Evading IDs, Firewalls, and Honeypots
  • Lesson 10: Cryptographic Attacks and Defenses
  • Lesson 11: Cloud Computing, IoT and Botnets

Student access for each license to the course content and resources for 6 months including:

  • All text, video, and end of lesson questions
  • Lab content (where available)
  • Practice Test