CEH (v10) – Certified Ethical Hacking Course
₹ 39,089.16
CEH (v10) – Certified Ethical Hacking Course
Learn advanced processes in this Certified Ethical Hacking (CEH) course. In this online ethical hacking training, you will master advanced network packet analysis and system penetration testing techniques to build your network security skill-set and prevent hackers.
Ethical Hacking Course Overview
Simplilearn’s CEH certification training course provides you the hands-on training required to master the techniques hackers use to penetrate network systems and fortify your system against it. This ethical hacking course is aligned with the latest CEH v10 by EC-Council and will adequately prepare you to increase your blue team skills.
Eligibility
This ethical hacking course is for network security officers and practitioners, site administrators, IS/IT specialists and analysts, IS/IT auditors, IT operations managers, IT security officers, network specialists, technical support engineers, senior systems engineers, and systems analysts.
Pre-requisites
There are no prerequisites to take up this ethical hacking certification training course.
- Demo of Aspen and iLabs
- Internet is Integral Part of Business and Personal Life – What Happens Online in 60 Seconds
- Essential Terminology
- Elements of Information Security
- The Security, Functionality, and Usability Triangle
- Motives, Goals, and Objectives of Information Security Attacks
- Top Information Security Attack Vectors
- Information Security Threat Categories
- Types of Attacks on a System
- 5 Information Warfare
- Penetration Testing
- Why Penetration Testing
- Comparing Security Audit, Vulnerability Assessment, and Penetration Testing
- Blue Teaming/Red Teaming
- Types of Penetration Testing
- Phases of Penetration Testing
- Security Testing Methodology
- What is Hacking
- Who is a Hacker?
- Hacker Classes
- Hacking Phases
- What is Ethical Hacking?
- Why Ethical Hacking is Necessary
- Scope and Limitations of Ethical Hacking
- Skills of an Ethical Hacker
- Information Assurance (IA)
- Information Security Management Program
- Enterprise Information Security Architecture (EISA)
- Network Security Zoning
- Defense in Depth
- Information Security Policies
- Physical Security
- What is Risk?
- Threat Modeling
- Incident Management
- Security Incident and Event Management (SIEM)
- User Behavior Analytics (UBA)
- Network Security Controls
- Identity and Access Management (IAM)
- Data Leakage
- Data Backup
- Data Recovery
- Role of AI/ML in Cyber Security
- Payment Card Industry Data Security Standard (PCI-DSS)
- ISO/IEC 27001:2013
- Health Insurance Portability and Accountability Act (HIPAA)
- Sarbanes Oxley Act (SOX)
- The Digital Millennium Copyright Act (DMCA)
- Federal Information Security Management Act (FISMA)
- Cyber Law in Different Countries
- IT or IS professionals looking to obtain their CEH certification
- IT professionals looking to expand their careers into security
- Students who want a better understanding of information security components
- Assess technical vulnerabilities for the potential for exploitation
- Apply a code of ethics to testing situations
- Perform technical vulnerability assessments
- Determine appropriate remediations for vulnerabilities
- Operate tools and utilities used in security testing
- Describe a basic penetration testing methodology
- Compare differences between testing methodologies that exist
- Assess a testing request to identify the scope and remain within that scope
Course Syllabus
Lesson 01 – Information Security Overview
Lesson 02 – Information Security Threats and Attack Vectors
Lesson 06 – Penetration Testing Concepts
Lesson 03 – Hacking Concepts
Lesson 04 – Ethical Hacking Concepts
Lesson 05 – Information Security Controls
Lesson 07 – Information Security Laws and Standards
The importance of ethical hacking isn’t in the breaking, it’s in the fixing. To that end, you will need to understand remediations, like good software development practices, remediating web application vulnerabilities as well as policies and standards that should govern all information security practices within an organization.
Who this course is for:
What you’ll learn:
Reviews
There are no reviews yet.