Opleiding: Course Certified Ethical Hacker
The course Certified Ethical Hacker covers the basics of information security, the principles of ethical hacking, relevant laws and standard procedures.Foot Printing and Reconnaissance
Learn to use the latest techniques to perform foot printing and reconnaissance, a critical phase of the ethical hacking process.
Scanning Networks
Learn network scanning techniques. Learn various enumeration techniques, such as BGP and NFS exploits.
System Hacking
Learn system hacking methodologies like steganography, steganalysis attacks and tracks—used to discover vulnerabilities.
Malware Threats
Learn different types of malware (Trojan, virus, etc.), APT and fileless malware, malware analysis procedure.
Sniffing
Learn to use packet-sniffing techniques to discover network vulnerabilities and to defend against sniffing attacks.
Social Engineering
Learn social engineering techniques, including identifying theft attempts and audit human-level vulnerabilities.
Denial of Service
Learn about different Denial of Service attack techniques, as well as the tools used to audit and protect a target.
Session Hijacking and SQL Injection
Understand session hijacking techniques to discover network-level session management and SQL Injection attacks.
Evading IDS, Firewalls, and Cryptography
Get introduced to firewall, intrusion detection system (IDS), and cryptography attacks.
Hacking Web Servers
Learn about web server attacks, including attack methodology used to audit vulnerabilities in web server infrastructures.
Hacking Wireless Networks
Understand different types of wireless technologies, including encryption and Wi-Fi security tools.
Hacking Mobile Platforms and IoT
Learn Mobile platform attack vectors, IoT and OT attacks, mobile device management and mobile security guidelines.
Cloud Computing
Learn cloud computing concepts and threats, attacks, hacking methodology and cloud security techniques and tools.
Audience Course Certified Ethical Hacker
The course Certified Ethical Hacker is intended for aspiring cybersecurity professionals who want to learn techniques to find weaknesses in systems before criminals do.
Prerequisites Course Certified Ethical Hacker
General knowledge of computer systems and security problems is sufficient.
Execution of Training Certified Ethical Hacker
In the course Certified Ethical Hacker participants learn the tools and techniques to investigate networks and systems for security problems through hands-on exercises.
Certification course Certified Ethical Hacker
After successfully completing the training, participants will receive a certificate of participation in the course Certified Ethical Hacker. The course meets the requirements for the Certified Ethical Hacker exam of the EC-Council. After the course one can pass this exam with the knowledge gained.
Modules
Module 1 : Intro Ethical Hacking
- Fundamental Security Issues
- Ethical Hacking Basics
- Laws and Standard Procedures
Module 2 : Foot Prints
- Foot Printing Techniques
- Reconnaissance Techniques
- Pre-attack Phase
Module 3 : Scanning Networks
- Network Scanning
- Determining Device State
- Countermeasures
Module 4 : Enumeration
- Enumeration Techniques
- Border Gateway Protocol
- Network File Sharing
Module 5 : Vulnerability Analysis
- Security Loopholes
- Vulnerability assessment
- Assessment Tools
Module 6 : System Hacking
- Hacking Methodologies
- Steganography Attacks
- Steganalysis Attacks
Module 7 : Malware Threats
- Malware Threats
- Malware Analysis
- Malware Countermeasures.
Module 8 : Sniffing
- Packet-sniffing Techniques
- Discover Network Vulnerabilities
- Countermeasures Sniffing Attacks.
Module 9 : Social Engineering
- Social Engineering Techniques
- Identify Theft Attempts
- Human-level Vulnerabilities
Module 10 : Denial-of-Service
- Denial of Service (DoS)
- Distributed DoS (DDos)
- Countermeasures and Protections
Module 11 : Session Hijacking
- Session Hijacking Techniques
- Authentication and Authorization
- Cryptographic Weaknesses
Module 12 : Evading IDS and Firewalls
- Intrusion Detection System (IDS)
- Honeypot Evasion Techniques
- Perimeter for Weaknesses
Module 13 : Hacking Web Servers
- Web Server Attacks
- Attack Methodology
- Audit Vulnerabilities
Module 14 : Hacking Web Apps
- Web Application Attacks
- Vulnerabilities Web Apps
- Countermeasures
Module 15 : SQL Injection
- SQL Injection Attacks
- Evasion Techniques
- Injection Countermeasures.
Module 16 : Hacking Wireless
- Wireless Technologies
- Encryption Threats
- Wi-Fi Security Tools
Module 17 : Hacking Mobile Platforms
- Mobile Attack vector
- Android and iOS Hacking
- Mobile Security Guidelines
Module 18 : IoT Hacking
- IoT and OT attacks
- Hacking Methodology
- Hacking tools
Module 19 : Cloud Computing
- Container Technologies
- Server Less Computing
- Cloud Computing Threats
Module 20 : Cryptography
- Encryption Algorithms
- Cryptography Tools
- Cryptography Attacks

