• PT Telkom Prima Cipta Certifia
  • (+62) 22-200-7891
  • (+62) 811-2282-500
  • marketing@telkompcc.co.id

Certified Ethical Hacker (CEH) V.1.1

The Certified Ethical Hacker (CEH v11 Training) program by EC-Council upgrades your understanding of core security fundamentals. Certified Ethical Hacker (CEH V11 Certification Course) is one of the most sought-after security certifications globally that is considered in high regard. This internationally valued security training validates your abilities to identify the vulnerabilities in the organization’s network infrastructure and helps to combat cyber-attacks effectively.

CEH v11 Training is the second course in the new Vulnerability Assessment and Penetration Testing (VAPT) Track developed by EC-Council. In the latest version, EC-Council has added topics and concepts considering the recent advancements in the field of cybersecurity. The course equips you with the understanding of the latest commercial hacking tools, practices, and methodologies used by real-world hackers.


Category :
  • IT
Training ID :
  • IT-CR-15

Overview

The Certified Ethical Hacker (CEH v11 Training) program by EC-Council upgrades your understanding of core security fundamentals. Certified Ethical Hacker (CEH V11 Certification Course) is one of the most sought-after security certifications globally that is considered in high regard. This internationally valued security training validates your abilities to identify the vulnerabilities in the organization’s network infrastructure and helps to combat cyber-attacks effectively.

CEH v11 Training is the second course in the new Vulnerability Assessment and Penetration Testing (VAPT) Track developed by EC-Council. In the latest version, EC-Council has added topics and concepts considering the recent advancements in the field of cybersecurity. The course equips you with the understanding of the latest commercial hacking tools, practices, and methodologies used by real-world hackers.

Objective Duration

Successful completion of the CEH v11 certification training empowers you with across a broad understanding of:
• Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
• Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
• Performing network scans, host and port discovery by utilizing different scanning tools
• Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
• Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
• Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
• Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
• Packet sniffing concepts, techniques, and protection against the same.
• Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
• Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defence tools
• Security solutions like firewall, IPS, honeypots, their evasion, and protection
• Web server and web application-based attacks, methodologies
• SQL injection, hijacking, and evasion techniques
• Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
• Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
• Operational Technology (OT) essentials, threats, attack methodologies and attack prevention. The concept of OT is a new addition.
• Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
• Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
• Cloud computing, threats and security, essentials of container technology and serverless computing



Duration

5 Days

Course Outline

1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. Vulnerability Analysis
6. System Hacking
7. Malware Threats
8. Sniffing
9. Social Engineering
10. Denial-of-service
11. Session Hijacking
12. Evading IDS, Firewalls, and Honeypots
13. Hacking Web Servers
14. Hacking Web Applications
15. SQL Injection
16. Hacking Wireless Networks
17. Hacking Mobile Platforms
18. IoT Hacking
19. Cloud Computing
20. Cryptography

Audience

Metodologi