- Leren door doen
- Trainers met praktijkervaring
- Klassikale trainingen
- Gedetailleerd cursusmateriaal
- Duidelijke inhoudsbeschrijving
- Maatwerk inhoud mogelijk
- Trainingen die doorgaan
- Kleine groepen
De cursus Certified Ethical Hacker behandelt de grondbeginselen van informatie beveiliging, de principes van ethisch hacken, relevante wetten en standaard procedures. Na afloop kan men zich certificeren tot Certified Ethical Hacker door examen te doen.
Learn to use the latest techniques to perform foot printing and reconnaissance, a critical phase of the ethical hacking process.
Learn network scanning techniques. Learn various enumeration techniques, such as BGP and NFS exploits.
Learn system hacking methodologies like steganography, steganalysis attacks and tracks—used to discover vulnerabilities.
Learn different types of malware (Trojan, virus, etc.), APT and fileless malware, malware analysis procedure.
Learn using packet-sniffing techniques to discover network vulnerabilities, and to defend against sniffing attacks.
Learn social engineering techniques, including identifying theft attempts and audit human-level vulnerabilities.
Learn about different Denial of Service attack techniques, as well as the tools used to audit and protect a target.
Understand session hijacking techniques to discover network-level session management and SQL Injection attacks.
Get introduced to firewall, intrusion detection system (IDS), and cryptography attacks.
Learn about web server attacks, including attack methodology used to audit vulnerabilities in web server infrastructures.
Understand different types of wireless technologies, including encryption and Wi-Fi sedcurity tools.
Learn Mobile platform attack vector, IoT and OT attacks, mobile device management and mobile security guidelines.
Learn cloud computing concepts and threats, attacks, hacking methodology and cloud security techniques and tools.
De cursus Certified Ethical Hacker is bedoeld voor aanstaande cybersecurity professionals die technieken willen leren om zwakheden in systemen te vinden voordat criminelen dat doen.
Algemene kennis van computer systemen en security problemen is voldoende.
In de cursus leren de deelnemers door middel van hands-on exercises de tools en technieken om netwerken en systemen te onderzoeken op beveiligingsproblemen.
De deelnemers krijgen na het goed doorlopen van de training een certificaat van deelname aan de cursus Certified Ethical Hacker. De cursus sluit aan op de vereisten voor het Certified Ethical Hacker examen van het EC-Council. Na afloop kan men met de opgedane kennis dit examen behalen.
Module 1 : Intro Ethical Hacking |
Module 2 : Foot Prints |
Module 3 : Scanning Networks |
Fundamental Security Issues Ethical Hacking Basics Laws and Standard Procedures |
Foot Printing Techniques Reconnaissance Techniques Pre-attack Phase |
Network Scanning Determining Device State Countermeasures |
Module 4 : Enumeration |
Module 5 : Vulnerability Analysis |
Module 6 : System Hacking |
Enumeration Techniques Border Gateway Protocol Network File Sharing |
Security Loopholes Vulnerability assessment Assessment Tools |
Hacking Methodologies Steganography Attacks Steganalysis Attacks |
Module 7 : Malware Threats |
Module 8 : Sniffing |
Module 9 : Social Engineering |
Malware Threats Malware Analysis Malware Countermeasures. |
Packet-sniffing Techniques Discover Network Vulnerabilities Countermeasures Sniffing Attacks. |
Social Engineering Techniques Identify Theft Attempts Human-level Vulnerabilities |
Module 10 : Denial-of-Service |
Module 11 : Session Hijacking |
Module 12 : Evading IDS and Firewalls |
Denial of Service (DoS) Distributed DoS (DDos) Countermeasures and Protections |
Session Hijacking Techniques Authentication and Authorization Cryptographic Weaknesses |
Intrusion Detection System (IDS) Honeypot Evasion Techniques Perimeter for Weaknesses |
Module 13 : Hacking Web Servers |
Module 14 : Hacking Web Apps |
Module 15 : SQL Injection |
Web Server Attacks Attack Methodology Audit Vulnerabilities |
Web Application Attacks Vulnerabilities Web Apps Countermeasures |
SQL Injection Attacks Evasion Techniques Injection Countermeasures. |
Module 16 : Hacking Wireless |
Module 17 : Hacking Mobile Platforms |
Module 18 : IoT Hacking |
Wireless Technologies Encryption Threats Wi-Fi Security Tools |
Mobile Attack vector Android and iOS Hacking Mobile Security Guidelines |
IoT and OT attacks Hacking Methodology Hacking tools |
Module 19 : Cloud Computing |
Module 20 : Cryptography |
|
Container Technologies Server Less Computing Cloud Computing Threats |
Encryption Algorithms Cryptography Tools Cryptography Attacks |