Price:
$3,550.00
Days:
1
Virtual
– • Learn to gather essential information about your target
– • Gain the ability to identify weaknesses in the target system
– • Learn how to actively exploit identified vulnerabilities
– • Develop skills to maintain continued access to the target systems
– • Master the art of erasing any trace of your activities
• A minimum of 2 years of experience in IT security is strongly recommended before attempting CEH.
• Candidates should understand the basic functions of IT systems before attempting to hack them.
• CEH training involves testing systems and using them for purposes not originally intended.
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Introduction to Ethical Hacking
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Footprinting and Reconnaissance
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Scanning Networks
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Enumeration
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• Vulnerability Analysis
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• System Hacking
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
• Malware Threats
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Sniffing
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Social Engineering
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Denial-of-Service
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Session Hijacking
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Evading IDS, Firewalls, and Honeypots
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Servers
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• Hacking Web Applications
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• SQL Injection
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Wireless Networks
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• Hacking Mobile Platforms
• IoT Hacking
• IoT Hacking
• IoT Hacking
• IoT Hacking
• IoT Hacking
• IoT Hacking
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cloud Computing
• Cryptography
• Cryptography
• Cryptography
• Cryptography
• Cryptography
• Cryptography
Support Diversity, Equity, and Inclusion with Every Purchase.
Great Horizons is a North Carolina Certified HUB Vendor and WOSB. By becoming a patron of our organization, you are not only supporting a historically underutilized business, but a woman-owned small business as well.
Give your organization the skills edge it needs. Our corporate training experts will work with you to design, deliver, and support a customized IT program that drives real business results.