For business inquiries : (+971) 561803315

For special requests : (+971) 561803315

A propos de la formation Certified Ethical Hacker CEH v12

The Certified Ethical Hacker (CEH v12) training provides advanced knowledge of ethical hacking techniques, tools, and methodologies used to assess and secure systems.

Détails
Objectifs pédagogiques de la formation Certified Ethical Hacker CEH v12
  • Master ethical hacking methodology
  • Gain penetration testing skills
  • Identify system vulnerabilities
  • Understand attack techniques and countermeasures
  • Prepare for CEH certification exam.

Qui devrait suivre cette formation Certified Ethical Hacker CEH v12 ?

Public visé par la formation Certified Ethical Hacker CEH v12

This training is designed for security professionals, network administrators, IT managers, and decision-makers concerned with cybersecurity and infrastructure protection.  

Prérequis de la formation Certified Ethical Hacker CEH v12

Basic knowledge of TCP/IP, Linux, and Windows Server is recommended.

Formations Similaires

  • CISA – Certified Information Systems Auditor Détails
  • NIST CyberSecurity Framework 2.0 Détails
  • Security Manager Détails
  • COBIT 2019 Détails
  • TOGAF 9.2 Détails
  • ISO 45001 Lead Auditor Détails
  • ISO 27001 Lead Auditor Détails
  • ISO 27001 Lead Implementer Course Détails
  • ISO 45001 Lead Implementer Détails
  • ISO 27001 Lead Auditor Training Course Détails
  • ISO 27005 Training Détails
  • ISO 27002 Foundation Détails
  • Offensive Security Certified Professional (OSCP) Détails
  • EBios Détails
  • TOGAF® 10 Détails
  • ISO 22301 Lead Implementer Détails
  • Stormshield Détails
  • Configuring BIG-IP - Application Security Manager (ASM) Détails
  • ForgeRock Détails
  • Spring Security 5 Détails
  • Certified Ethical Hacker (CEH) v12 Détails
  • Implementing PowerShell Security Détails
  • Veeam Backup and Replication v12 Détails
  • KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
  • LPIC-3 Exam 303: Security Détails
  • SSO (Single Sign-On) Détails
  • IT Governance Détails
  • CCSA, Check Point Certified Security Administrator R81 Détails
  • CCSE - Check Point Certified Security Expert R80.10 Détails
  • Securing Email with Cisco Email Security Appliance SESA Détails
  • Certified Ethical Hacker CEH v12 Détails
  • FCNSA Fortinet Certified Network Security Administrator Détails
  • NSE 4 FortiGate Network Security Professional Détails
  • NSE5 FortiManager 7.0 Détails
  • Securing the Web with Cisco Web Security Appliance Détails
  • Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
  • CCNP Security Détails
  • Android app security Détails
  • Mastering IT Project Audit: Techniques and Best Practices Détails
  • SharePoint : Planification et administration (70-339) Détails

Déroulé de la formation Certified Ethical Hacker CEH v12


Module 1: Introduction to Ethical Hacking

Understanding Ethical Hacking

Ethical and Legal Considerations

Scope and Goals

Different Types of Hackers


Module 2: Footprinting and Reconnaissance

Information Gathering Techniques

Footprinting Methods

Search Engine Footprinting

Social Media Footprinting


Module 3: Network Scanning

Overview of Network Scanning

Types of Scans

Scanning Tools and Techniques


Module 4: Enumeration

Introduction to Enumeration

Enumeration Techniques

Enumerating Network Services


Module 5: Vulnerability Analysis

Identifying Vulnerabilities

Vulnerability Assessment Tools

Common Vulnerabilities and Exposures (CVE)


Module 6: System Hacking

Password Cracking

Privilege Escalation

Gaining Unauthorized Access


Module 7: Malware Threats

Introduction to Malware

Types of Malware

Malware Analysis Techniques


Module 8: Sniffing

Sniffing Concepts

Sniffing Tools

Packet Analysis


Module 9: Social Engineering

Understanding Social Engineering

Social Engineering Techniques

Mitigation Strategies


Module 10: Denial of Service (DoS)

DoS Attack Types

DoS Countermeasures

Protecting Against DoS Attacks


Module 11: Session Hijacking

Session Hijacking Concepts

Session Hijacking Techniques

Preventing Session Hijacking


Module 12: Evading IDS, Firewalls, and Honeypots

Intrusion Detection Systems (IDS)

Firewall Evasion Techniques

Detecting and Avoiding Honeypots


Module 13: Hacking Web Servers

Web Server Architecture

Web Server Attacks

Securing Web Servers


Module 14: Hacking Web Applications

Web Application Architecture

Web Application Attacks

Web Application Security Best Practices


Module 15: SQL Injection

SQL Injection Concepts

SQL Injection Attacks

Preventing SQL Injection Attacks


Module 16: Hacking Wireless Networks

Wireless Network Basics

Wireless Security Protocols

Exploiting Wireless Networks


Module 17: Hacking Mobile Platforms

Mobile Security Challenges

Mobile Platform Vulnerabilities

Exploiting Mobile Devices


Module 18: IoT Hacking

Internet of Things (IoT) Overview

IoT Security Challenges

Exploiting IoT Devices


Module 19: Cloud Computing

Cloud Computing Fundamentals

Cloud Security Risks

Cloud Security Best Practices


Module 20: Cryptography

Cryptographic Concepts

Encryption Techniques

Cryptanalysis Attacks and Countermeasures

Formations Similaires
CISA – Certified Information Systems Auditor Détails
NIST CyberSecurity Framework 2.0 Détails
Security Manager Détails
COBIT 2019 Détails
TOGAF 9.2 Détails
ISO 45001 Lead Auditor Détails
ISO 27001 Lead Auditor Détails
ISO 27001 Lead Implementer Course Détails
ISO 45001 Lead Implementer Détails
ISO 27001 Lead Auditor Training Course Détails
ISO 27005 Training Détails
ISO 27002 Foundation Détails
Offensive Security Certified Professional (OSCP) Détails
EBios Détails
TOGAF® 10 Détails
ISO 22301 Lead Implementer Détails
Stormshield Détails
Configuring BIG-IP - Application Security Manager (ASM) Détails
ForgeRock Détails
Spring Security 5 Détails
Certified Ethical Hacker (CEH) v12 Détails
Implementing PowerShell Security Détails
Veeam Backup and Replication v12 Détails
KL 002.104: Kaspersky Endpoint Security and Management. Fundamentals Détails
LPIC-3 Exam 303: Security Détails
SSO (Single Sign-On) Détails
IT Governance Détails
CCSA, Check Point Certified Security Administrator R81 Détails
CCSE - Check Point Certified Security Expert R80.10 Détails
Securing Email with Cisco Email Security Appliance SESA Détails
Certified Ethical Hacker CEH v12 Détails
FCNSA Fortinet Certified Network Security Administrator Détails
NSE 4 FortiGate Network Security Professional Détails
NSE5 FortiManager 7.0 Détails
Securing the Web with Cisco Web Security Appliance Détails
Blue Coat Certified Security Analytics Administrator (BCSAA) Détails
CCNP Security Détails
Android app security Détails
Mastering IT Project Audit: Techniques and Best Practices Détails
SharePoint : Planification et administration (70-339) Détails

Vous pouvez faire l’inscription ou la demande du devis avec un seul click