CEHv11 – Certified Ethical Hacker

Description

This program provides a deep understanding of the phases of ethical hacking, various attack vectors, and preventative countermeasures. It will teach you how hackers maliciously think and act so that you can be better positioned to establish your security infrastructure and defend against future attacks. Understanding system vulnerabilities and weaknesses helps organizations strengthen their system security controls to reduce the risks of an incident. CEH was created to incorporate a practical environment and systematic processes across all ethical hacking methodology and domains, providing you with the opportunity to work providing the skills and knowledge required to carry out the work of an ethical hacker. You will be exposed to a totally different posture through responsibilities and measures required to be safe. In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

Addressed to

  • Administrator / Information Security Analyst
  • Information Assurance Security Officer
  • Information Security Specialist / Manager
  • Information Systems Security Manager / Engineer
  • Information Security Officers / Professionals
  • IT Auditors / in Information Security
  • Vulnerabilities / Threats / Risks Analyst
  • System Administrators
  • Network Engineers and Administrators

Duration

40 hours

Modalities

  • Face-to-face

  • Virtual live through digital platforms

  • on site

Related Courses

  • Certified Penetration Testing Professional – CPENT

  • Computer Hacking Forensic Investigator – CHFI

It includes

  • 40 hours of training

  • certified instructors

  • Participant Handbook

  • Certification Exam

  • Proof of participation

Temary


Lesson 1: Introduction to Ethical Hacking

Lesson 2: Footprints and Recognition

Lesson 3: Network Scanning

Lesson 4: Enumeration

Lesson 5: Vulnerability Analysis

Lesson 6: Hacking Systems

Lesson 7: Malware Threats

Lesson 8: Sniffing

Lesson 9: Social Engineering

Lesson 10: Denial of Service

Lesson 11: Session Hijacking

Lesson 12: Evasion of IDS, Firewalls and Honeypots

Lesson 13: Hacking Web Servers

Lesson 14: Hacking Web Applications

Lesson 15: SQL injection

Lesson 16: Hacking Wireless Networks

Lesson 17: Mobile Platform Hacking

Lesson 18: Hacking IoT (Internet of Things)

Lesson 19: Cloud Computing

Lesson 20: Cryptography

Lesson 21: Certification Scheme

Lesson 22: Exam Description

Lesson 23: Review and Evaluation

You want more information about this curse? Contact us!

By sending this message you agree to our Privacy Notice

Intranet

Renewable Energy

What is it?

We offer specialized services of photovoltaic solar energy that is obtained directly from solar radiation through a solar panel that in turn transforms it into electric power.

Who is it for?

All those companies, businesses and homes that want to reduce costs in their day to day and want to have a sustainability plan to support the environment as well as their economy.

Why us?

1.- Support from a team committed to the environment.
2.- GSB will provide you with the best solution according to your needs
3.- Control and monitoring as well as operation reports, maintenance of preventive and corrective equipment.

Cybersecurity

What is it?

We offer specialized services in Cyber ​​​​Security in real time with the best tools, alliances and technology for the protection of your information and operation.

Who is it for?

All those companies that use technology on a daily basis and wish to have the guarantee of a team with vast experience, knowledge, kindness, efficiency and speed.

Why us?

1.- We identify your needs and proceed to define the required actions, through the use of analysis tools such as: diagnostic interviews, concept tests, simulators and questionnaires.

2.- We have the best specialists in the market, which allows us to provide you with a service that guarantees your protection against threats.

3.- We implement processes that allow timely feedback, through which we manage to mitigate risks and protect the computer security of your company.