Certified Ethical Hacker (CEH)

(0 review)
1, 000.00BHD 580.00BHD
Certified Ethical Hacker (CEH)

 

This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.

 

As an EC-Council partner, we at ProCloud Training Center, provide you with hands-on experience & practice, through our instructor-led courses in Certified Ethical Hacker, in order to attain the required technical skills to work on such IT Security environment. Our trainers are certified, so qualified experts in this field, who have extensive experience in Bahrain and Gulf business environment. We reinforce the training process by tying the learning objectives to the real business needs. We provide full guide and support to the trainees, to validate their achievements, track their progress, and well prepare them to pass the international exams.

Register now using the form at the end of this page, and we will get back to you!


Certified Ethical Hacker | Outline 

 


 

Course Features

  • Lectures 20
  • Quizzes 0
  • Duration 40 hours
  • Language English
  • Students 0
  • Certificate No
  • Assessments Self
  • 0/20

    • Lecture1.1
      Introduction to Ethical Hacking
      0m
    • Lecture1.2
      Footprinting and Reconnaissance
      0m
    • Lecture1.3
      Scanning Networks
      0m
    • Lecture1.4
      Enumeration
      0m
    • Lecture1.5
      System Hacking
      0m
    • Lecture1.6
      Trojans backdoor
      0m
    • Lecture1.7
      Viruses and Worms
      0m
    • Lecture1.8
      Sniffers
      0m
    • Lecture1.9
      Social Engineering
      0m
    • Lecture1.10
      Denial of Service
      0m
    • Lecture1.11
      Session Hijjacking
      0m
    • Lecture1.12
      Hacking Webserver
      0m
    • Lecture1.13
      Hacking Web Applications
      0m
    • Lecture1.14
      SQL Injection
      0m
    • Lecture1.15
      Hacking Wireless Networks
      0m
    • Lecture1.16
      Hacking Mobile Platforms
      0m
    • Lecture1.17
      Evading IDS, Firewalls and Honeypots
      0m
    • Lecture1.18
      Buffer Overflow
      0m
    • Lecture1.19
      Cryptography
      0m
    • Lecture1.20
      Penetration Testing
      0m

Reviews

Average Rating

0
0 rating

Detailed Rating

5 stars
0
4 stars
0
3 stars
0
2 stars
0
1 star
0
1, 000.00BHD 580.00BHD

Leave A Reply

Your email address will not be published. Required fields are marked *