Corporate / Group Training

Certified Ethical Hacker CEH

Length
5 days
Price
3,250 USD
Next course start
Start anytime See details
Delivery
Virtual Classroom
Length
5 days
Price
3,250 USD
Next course start
Start anytime See details
Delivery
Virtual Classroom
This provider usually responds within 48 hours 👍

Course description

Cyber Security

Certified Ethical Hacker CEH

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

This course will immerse students into the Hacker Mindset so that they will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies, or pieces of equipment. This ethical hacking course puts students in the driver’s seat of a hands-on environment with a systematic process. Students will scan, test, hack, and secure your own systems. They will be taught the five phases of ethical hacking: Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

Do you work at this company and want to update this page?

Is there out-of-date information about your company or courses published here? Fill out this form to get in touch with us.

Upcoming start dates

1 start date available

Start anytime

  • Virtual Classroom
  • Online

Training content

  • Module 1: Introduction to Ethical Hacking
  • Module 2: Foot-printing
  • Module 3: Scanning
  • Module 4: Enumeration
  • Module 5: System Hacking
  • Module 6: Trojans and Backdoors
  • Module 7: Sniffers
  • Module 8: Denial of Service
  • Module 9: Social Engineering
  • Module 10: Session Hijacking
  • Module 11: Hacking Web Servers
  • Module 12: Web Application Vulnerabilities
  • Module 13: Web-based Password Cracking Techniques
  • Module 14: SQL Injection
  • Module 15: Hacking Wireless Networks
  • Module 16: Virus and Worms
  • Module 17:Physical Security
  • Module 18: Linux Hacking
  • Module 19: Evading IDS, Firewalls, and Honeypots
  • Module 20: Buffer Overflows
  • Module 21: Cryptography
  • Module 22: Penetration Testing

Why choose Training Concepts?

98% student satisfaction

Over 11,330 students trained and growing 

Over 100 hours of training each week

Contact this provider

Contact course provider

Before we redirect you to this supplier's website, do you mind filling out this form so that we can stay in touch? You can unsubscribe at any time.
If you want us to recommend other suitable courses, please fill out all fields below and check the box beside "Please recommend similar options"
Country *

reCAPTCHA logo This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.
Training Concepts

Training Concepts

For almost two decades, Training Concepts has taken great pride in helping create bigger futures. That’s bigger futures for our current students, our alumni, our business partners, our community, and ourselves. Through dynamic, hands-on, instructor-led technology training, we equip our...

Read more and show all training delivered by this supplier

Ads