• 985-1165508
  • info@itsecuritynepal.com

Certified Ethical Hacking

1.5 Months 2 Hrs/Day 7 AM to 6 PM
Certified Ethical Hacking

Certified Ethical Hacker Training from IT Security introduces the latest version CEH v11 to keep up with the changing times. IT Security provides the best environment and infrastructure set-up to get you certified in ethical hacking. The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. An IT security professional as a Penetration Tester or Ethical Hacker. Getting trained for CEH reinforces the capabilities of an individual to safeguard enterprise networks against the innumerable vulnerabilities and threats of a network as well as thwart all attempts of illegal hacking by intruders.

“To beat a hacker, you need to think like a hacker”.

Course Objectives :

  • A CEH ethically penetrates into network systems using various tools to test the strength of a network.
  • CEH v11 course shows participants how to test, scan, hack and secure networks and systems.
  • Get in-depth theoretical knowledge and rich practical experience in hacking test networks.
  • Learn perimeter defenses to scan and attack own networks.
  • Learn various techniques such as Intrusion Detection, Social Engineering, Policy Creation,
  • Buffer Overflows, DDoS Attacks, Virus creation etc.
  • CEH v11 is approved by DoD (Department of Defense) under 'Directive 8570' to include CND (Computer Network Defense) category.
  • Get acquainted with new counter-measures and attacking methods for hacking different mobile platforms such as iOS, Android, Blackberry, Windows Phone, with a new Module 16 for securing mobile infrastructures.
  • CEH release 11 has a cloud based lab environment - iLabs, which is a platform for Windows 8, Windows 7, BackTrack and Server 2012/2016.
  • CEH v11 is an industry accepted certification recognized by CNSS, NSA and ANSI/ISO/IEC 17024 standard.

Introduction to Ethical Hacking

Footprinting and Reconnaissance

Scanning Networks

Enumeration

System Hacking

Malware Threats

Sniffing

Social Engineering

Denial-of-Service

Session Hijacking

Hacking Webservers

Hacking Web Applications

SQL Injection

Hacking Wireless Networks

Hacking Mobile Platforms

Evading IDS, Firewalls, and Honeypots

Cloud Computing

Cryptography

One year of experience managing Windows/Unix/Linux systems or equivalent knowledge and skills Good Understanding of TCP/IP.

Software Professionals with basic knowledge of networking services can also attend CEH certification boot camp.

For any Query or Custom Plan


985-1165508

Head Office:

Phone No: +977-01-4469653

Mobile: +977-9851165508

New Baneshwor-10 (Beside K&K College),

Chhakku bakku marga, New Baneshwor,

info@itsecuritynepal.com

Classroom Training

Classroom Training

1 on 1 Training

1 on 1 Training

Live Virtual Training

Live Virtual Training

Flip Class

Flip Class


Related Courses


Certified Network Defender (CND)

Despite best efforts to stop breaches, several organizations area unit still being compromised. thus organizations should have, as a part of their defense mechanisms, trained network engineers who area unit targeted on protective, detecting, and responding to the threats on their networks. You will find out how to shield, find and answer the network attacks. you may learn network defense fundamentals, the applying of network security controls, protocols, perimeter appliances, secure IDS, VPN and firewall configuration. you may then learn the intricacies of network traffic signature, analysis and vulnerability scanning which is able to assist you after you style larger network security policies and winning incident response plans. These skills can assist you foster resiliency and continuity of operations throughout attacks.