EC Council Certified Ethical Hacker (CEH)

Reference : ECC CEH-001

Educational objectives

At the end of the training, participants should be able to:

  • Identify and understand various attack vectors used in cybersecurity breaches.
  • Identify live and vulnerable machines in a network.
  • Perform OS banner grabbing, service, and user enumeration.
  • Analyze systems for potential vulnerabilities.
  • Identify techniques for system hacking, steganography, steganalysis attacks, and covering tracks.
  • Identify and use viruses, computer worms, and malware to exploit systems.
  • Perform packet sniffing.
  • Identify social engineering techniques.
  • Identify Denial-of-Service attacks.
  • Aware of session hijacking.
  • Understand how to evade Intrusion Detection Systems (IDS), firewalls, and honeypots.

Course programme

This course trains participants to identify and resolve security vulnerabilities through ethical hacking techniques. It covers penetration testing methodologies, network scanning, and system security analysis.

Who is this course for?

Public
Empowering individuals aspiring to fortify the application knowledge of cybersecurity. The training is designed for security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
Prerequisites

Before starting this course, you should have experience of:

  • IT security and 
  • cybersecurity essentials

List of scheduled sessions

There is no session for this course

Further information