Certified Ethical Hacking (C|EH) V10
Préparez-vous à la certification CEH en apprenant les dernières techniques d’ethical hacking en participant à notre formation reconnue par EC Council!
Ce cours prépare à l’examen 312-50 CEH (Certified Ethical Hacker), seule certification reconnue à l’échelle mondiale pour faire valoir vos compétences d’auditeur technique en sécurité informatique.
- Certified Ethical Hacking (C|EH) training provides a comprehensive ethical hacking and network security- training program to meet the standards of highly skilled security professionals.
- This is the world’s most advanced ethical hacking course with 19 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organisation.
- The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
- The CEH class deals with real life scenarios and threats and will ensure that attendees understand how to look for weaknesses and vulnerabilities in a target system.
The CEH training course is comprised of 19 modules that will be covered over the 5 days:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Social Engineering
- Denial of Service
- Session Hijacking Hacking
- Webservers Hacking Web
- SQL Injection
- Hacking Wireless Networks
- Evading IDS, Firewalls, and Honeypots
- Buffer Overflow
- Penetration Testing
Who Would Benefit?
- Those who are involved in or responsible for, Computer Forensics Investigations:
- IT Security Officers
- Network Administrators
- Members of the Information Security Team
- Site Administrators
- Anyone dealing with network infrastructure integrity
What is an Ethical Hacker?
- An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.
- To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them.
- Ethical hacking is also known as penetration testing, intrusion testing and red teaming.
A qui s'adresse la formation?
Acteurs des services informatiques, Administrateurs, Administrateurs de bases de données, Gestionnaires des services informatiques, IT Security Officers, Network Administrators
Une attestation de participation sera transmise aux participants