Certified Ethical Hacking (CEH)
About this course
COURSE OVERVIEW
The Certified Ethical Hacker program is the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. As the EC Council puts it, “To beat a hacker, you need to think like a hacker”.
This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time!
This course benefits security professionals, site administrators, and anyone who is concerned about or interested in the integrity of the network and system infrastructure.
If you are interested in becoming or understanding ethical hacking, this course this is the course for you. You will be taught the methodology used by professional hackers and gain hands-on experience in identifying and exploiting IT security threats.
This course benefits security professionals, site administrators, and anyone who is concerned about or interested in the integrity of the network and system infrastructure.
If you are interested in becoming or understanding ethical hacking, this course this is the course for you. You will be taught the methodology used by professional hackers and gain hands-on experience in identifying and exploiting IT security threats.
COURSE CONTENTS
Module 01- Introduction to Ethical Hacking
Module 02- Foot printing and Reconnaissance
Module 03- Scanning Networks
Module 04- Enumeration
Module 05- Vulnerability Analysis
Module 06- System Hacking
Module 07- Malware Threats
Module 08- Sniffing
Module 09- Social Engineering
Module 10- Denial-of-Service
Module 11- Session Hijacking
Module 12 – Evading IDS, Firewalls, and Honeypots
Module 13- Hacking Web Servers
Module 14- Hacking Web Applications
Module 15- SQL Injection
Module 16- Hacking Wireless Networks
Module 17- Hacking Mobile Platforms
Module 18- IoT Hacking
Module 19- Cloud Computing
Module 20- Cryptography
PROGRESSION
After this course you will be able to enroll to other NIIT courses such as
- Advanced IT System Security
- Certified Network Defender ( CND )
- Certified SOC Analyts ( CSA )
- “Certified Application Security Engineer
- CASE ( .NET ) ( JAVA )”
- Computer Hacking Forensic Investigator ( CHFI )
- Cyber Security
MODULES
To receive complete course outline sign in HERE and we will get back to you shortly!
Course Curriculum
TUTOR SUPPORT
TUTOR SUPPORT
Our NIIT Qatar training specialists in Doha are experts in the IT industry with a minimum of 15 years real world experience backed with many certifications! They will patently guide you step by step!