Description
During this 5-day lab-intensive course, candidates will be immersed in an interactive environment where they will learn how perimeter defenses work and then be lead into scanning and attacking their own networks. No real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. When a student leaves this intensive 5-day class, they will have hands-on understanding and experience in Ethical Hacking.
This course prepares students for EC-Council Exam 312-50 CEH.
Prerequisites
Basic knowledge of Microsoft Windows operating system
Understanding of Networking in general
What’s included?
- Authorized Courseware
- Intensive Hands on Skills Development with an Experienced Subject Matter Expert
- Hands-on practice on real Servers and extended lab support 1.800.482.3172
- Examination Vouchers & Onsite Certification Testing- (excluding Adobe and PMP Boot Camps)
- Academy Code of Honor: Test Pass Guarantee
- Optional: Package for Hotel Accommodations, Lunch and Transportation
With several convenient training delivery methods offered, The Academy makes getting the training you need easy. Whether you prefer to learn in a classroom or an online live learning virtual environment, training videos hosted online, and private group classes hosted at your site. We offer expert instruction to individuals, government agencies, non-profits, and corporations. Our live classes, on-sites, and online training videos all feature certified instructors who teach a detailed curriculum and share their expertise and insights with trainees. No matter how you prefer to receive the training, you can count on The Academy for an engaging and effective learning experience.
Methods
- Instructor Led (the best training format we offer)
- Live Online Classroom – Online Instructor Led
- Self-Paced Video
Speak to an Admissions Representative for complete details
Start | Finish | Public Price | Public Enroll | Private Price | Private Enroll |
---|---|---|---|---|---|
03/30/2020 | 04/03/2020 | ||||
04/20/2020 | 04/24/2020 | ||||
05/11/2020 | 05/15/2020 | ||||
06/01/2020 | 06/05/2020 | ||||
06/22/2020 | 06/26/2020 | ||||
07/13/2020 | 07/17/2020 | ||||
08/03/2020 | 08/07/2020 | ||||
08/24/2020 | 08/28/2020 | ||||
09/14/2020 | 09/18/2020 | ||||
10/05/2020 | 10/09/2020 | ||||
10/26/2020 | 10/30/2020 | ||||
11/16/2020 | 11/20/2020 | ||||
12/07/2020 | 12/11/2020 | ||||
12/28/2020 | 01/01/2021 |
Curriculum
Module 01: Introduction to Ethical Hacking
Module 02: Footprinting and Reconnaissance
Module 03: Scanning Networks
Module 04: Enumeration
Module 05: Vulnerability Analysis
Module 06: System Hacking
Module 07: Malware Threats
Module 08: Sniffing
Module 09: Social Engineering
Module 10: Denial-of-Service
Module 11: Session Hijacking
Module 12: Evading IDS, Firewalls, and Honeypots
Module 13: Hacking Web Servers
Module 14: Hacking Web Applications
Module 15: SQL Injection
Module 16: Hacking Wireless Networks
Module 17: Hacking Mobile Platforms
Module 18: IoT Hacking
Module 19: Cloud Computing
Module 20: Cryptography