Certified Ethical Hacker (CEH) Certification Crash Training in Kenosha
We offer private customized training for groups of 3 or more attendees.
|
||
Course Description |
||
This live and interactive training is designed to help you prepare for the EC-Council Certified Ethical Hacker (CEH) version 10 certification exam. In this training we will review
Key topics and methodologies that you need to master the CEHv10 exam objectives
Step by step examples of security penetration testing methodologies and concepts
Sample questions for each of the topics covered in the exam.----------------------------
Learn how to craft exploits used by ethical hackers to perform real-world penetration testing engagements. Understand the methods for conducting wired and wireless network assessments, hacking web servers, and web applications. Explore attack techniques against mobile devices, IoT devices, and cloud deployments.------------------------------------
This Live Virtual Training is for:
Participants with an understanding of cybersecurity fundamentals.
Candidates studying for the Certified Ethical Hacker (CEH) version 10 certification.
Anyone interested in cybersecurity and penetration testing (ethical hacking) will benefit from this training.
Professionals wanting to learn different methodologies and best practices to perform security penetration testing assessments.--------------------------------------
You will learn:
The main topics covered in the CEHv10 exam.
Main topics through step-by-step demonstrations.
Course Length: 2 Days
Course Tuition: $970 (US) |
Prerequisites |
|
Course participants should have a basic understanding of cybersecurity and networking concepts. |
Course Outline |
Section 1: Introduction to Ethical Hacking and to the CEHv10 exam(30 minutes) - An introduction to ethical hacking and penetration testing methodologies. - Reviewing what is new in the CEHv10 exam.
Section 2: Foot-printing, Enumeration, Reconnaissance, and Network Scanning(50 minutes) - Introducing passive and active reconnaissance. - Reviewing network scanning and system enumeration. - Reviewing example questions.
Break 10 minutes
Section 3: Vulnerability Analysis and System Hacking(40 minutes) - Reviewing vulnerability analysis methodologies and system hacking. - Reviewing example questions.
Section 4: Social Engineering(40 minutes) - Introducing social engineering. - Reviewing social engineering tools and methodologies. - Reviewing example questions.
Break 10 minutes
Section 5: Denial-of-Service(30 minutes) - Introducing denial of service (DoS) attacks. - Reviewing examples of DoS attacks. - Reviewing example questions.
Section 6: Session Hijacking, Evading IDS, IPS, Firewalls, and Honeypots(30 minutes) - Introducing session hijacking. - Reviewing how to evade intrusion detection systems (IDS), intrusion prevention systems (IPS), and honeypots. - Reviewing example questions.
Break
Section 7: Cryptography(30 minutes) - Introducing cryptography concepts. - Reviewing cryptographic vulnerabilities. - Reviewing example questions.
Section 8: Hacking Wireless Networks(40 minutes) - Introducing wireless network vulnerabilities. - Reviewing how to hack wireless networks. - Reviewing example questions.
Break 10 minutes
Section 9: Hacking Web Servers and Web Applications(60 minutes) - Reviewing how to hack web servers. - Reviewing how to hack web applications. - Review example questions.
Break 10 minutes
Section 10: Hacking Mobile Platforms(30 minutes) - Introducing mobile security. - Reviewing mobile hacking methodologies and techniques. - Reviewing example questions.
Section 11: IoT Hacking(30 minutes) - Introducing IoT security. - Reviewing IoT hacking methodologies and techniques. - Reviewing example questions.
Section 12: Cloud Computing(30 minutes) - Introducing cloud computing. - Reviewing cloud security concepts. - Reviewing example questions |
Course Directory [training on all levels]
- .NET Classes
- Agile/Scrum Classes
- Ajax Classes
- Android and iPhone Programming Classes
- Blaze Advisor Classes
- C Programming Classes
- C# Programming Classes
- C++ Programming Classes
- Cisco Classes
- Cloud Classes
- CompTIA Classes
- Crystal Reports Classes
- Design Patterns Classes
- DevOps Classes
- Foundations of Web Design & Web Authoring Classes
- Git, Jira, Wicket, Gradle, Tableau Classes
- IBM Classes
- Java Programming Classes
- JBoss Administration Classes
- JUnit, TDD, CPTC, Web Penetration Classes
- Linux Unix Classes
- Machine Learning Classes
- Microsoft Classes
- Microsoft Development Classes
- Microsoft SQL Server Classes
- Microsoft Team Foundation Server Classes
- Microsoft Windows Server Classes
- Oracle, MySQL, Cassandra, Hadoop Database Classes
- Perl Programming Classes
- Python Programming Classes
- Ruby Programming Classes
- Security Classes
- SharePoint Classes
- SOA Classes
- Tcl, Awk, Bash, Shell Classes
- UML Classes
- VMWare Classes
- Web Development Classes
- Web Services Classes
- Weblogic Administration Classes
- XML Classes
- Introduction to Spring 5 (2022)
16 December, 2024 - 18 December, 2024 - Ruby Programming
2 December, 2024 - 4 December, 2024 - Fast Track to Java 17 and OO Development
9 December, 2024 - 13 December, 2024 - Ruby on Rails
5 December, 2024 - 6 December, 2024 - VMware vSphere 8.0 with ESXi and vCenter
9 December, 2024 - 13 December, 2024 - See our complete public course listing