
The Certified Ethical Hacker (CEH) certification is a professional certification provided by the International Council of E-Commerce Consultants.
The definition of an Ethical Hacker is very similar to a Penetration Tester. The Ethical Hacker is an individual who is usually employed with the organization and who can be trusted to undertake an attempt to penetrate networks and / or computer systems using the same methods as a Hacker.
Illegal hacking (i.e.; cracking computer systems) is a felony in the United States and most other countries. But when this type of hacking is done by request and under a contract between an Ethical Hacker and an organization, it is legal. The most important point is that an Ethical Hacker has authorization to probe the target.
A Certified Ethical Hacker is a skilled professional who understands and knows how to look for the weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker.
About this workshop
This workshop will demonstrate to participants how to scan, test, hack and secure their own systems in an interactive environment. The lab intensive environment gives each participant in-depth knowledge and practical experience with the current essential security systems. Participants will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. They will then learn how intruders escalate privileges and what steps can be taken to secure a system. They will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.
This 5 day highly interactive course will help participants have hands on understanding and experience in Ethical Hacking and prepare for EC-Council Certified Ethical Hacker exam 312-50.
Benefits
The EC-Council's Certified Ethical Hacker has emerged as one of today's most sought-after certifications. It serves as a significant step towards a career in information security management and could be followed by the CHFI, ECSA/LPT, CISA, CISM, CISSP certifications.
There are many reasons to achieve a CEH certification:
* Prepare yourself to handle network security with more clarity
* Expand your present knowledge of identifying threats and vulnerabilities
* Understand how to provide countermeasures
* Bring security expertise to your current occupation
* Become more marketable in a highly competitive environment
Therefore this workshop will prepare you to take the first step into the world of network security and give you a better understanding of various security concepts and practices that will be of valuable use to you and your organization.
Who should attend
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
* IT Managers
* Information Security Managers
* Security Consultants
* Security Architects
* Security Specialists
* Network Specialists
* Network Engineers
* System Administrators
* IS Auditors
Anyone aspiring for a career in Information Security would benefit from this course. The program is restricted to participants who have adequate knowledge of networking and TCP/IP concepts.
Course Outline
CEH v6 curriculum consists of instructor-led training and self-study modules. The instructor will provide the details of self-study modules to the students at the beginning of the class.
|