Ethical Hacker (CEH) Training Course - APG Learning
nav-closed

Register for interview

ethical hacker (ceh) training course

Write to us for more information

Ethical Hacker (CEH) Training Course

An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put…

  • Please Login..review_star 239
  • student_enrolled 80 Student's Enrolled
  • best_selling Best Selling
Write to us for more information

Course Detail

Duration

Modules

16

Hours

Start Date

Self paced

Course Provider:

Getcertgo

18,645.00 22,000.00

Training 5 or more people?

Get your team access to APG Learning top 200+ courses anytime, anywhere.

Try APG Learning for Business

About Course

An ethical hacker is a person who attacks an organizations security on behalf of its owners in order to discover vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. This series of courses has been designed to be used in preparation for the Certified Ethical Hacker v8, 312-50, exam. The courses were developed in partnership with EC-Council and are based on their Ethical Hacking and Countermeasures V8 course materials and labs.

Key Features

  • Unlimited access to online content
  • Content updated as per evolving Industry requirements
  • Certification developed by Industry professionals and academicians
  • Career boost for students and professionals

Modules

  • Hacking and Penetration Testing
  • Footprinting and Reconnaissance
  • Network Scanning
  • Enumeration and Cryptography
  • System Hacking
  • Malware
  • Sniffing
  • Social Engineering
  • Denial of Service and Session Hijacking
  • Hacking Web Servers
  • Hacking Web Applications
  • SQL Injection
  • Hacking Wireless Networks
  • Hacking Mobile Platforms
  • Evading IDS, Firewalls, and Honeypots
  • Buffer Overflow

SIMILAR COURSES

nav-closed

Download Brochure