This program provides an in-depth understanding of the phases of ethical hacking, various attack vectors and countermeasures. It will teach you how hackers think and act maliciously so that you can be better positioned to establish your security infrastructure and defend against future attacks. Understanding system vulnerabilities and weaknesses helps organizations strengthen their system security controls to reduce the risks of an incident. CEH was created to incorporate a practical environment and systematic processes throughout the entire methodology and domains of ethical hacking, providing you with the opportunity to work towards providing the skills and knowledge required to perform the work of an ethical hacker. You will be exposed to a totally different posture through responsibilities and measures required to be safe. In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits and technologies.
Aimed at
- Information Security Administrator / Analyst
- Information Assurance Security Officer
- Information Security Specialist / Manager
- Information Systems Security Manager / Engineer
- Information Security Officers / Professionals
- IT / Information Security Auditors
- Vulnerabilities / Threats / Risks Analyst
- System Administrators
- Network Engineers and Administrators
Duration
40 hours
Modalities
- On-site
- Virtual live through digital platforms
- On site
Includes
- 40 hours of training
- Certified instructors
- Participant's Manual
- Certification Examination
- Proof of participation