Enquire

Submit your enquiry for CEH v8 ( Certified Ethical Hacker ) Training

Please enter valid question or comment

Please enter your name.

Please enter valid Phone Number

Please enter the Pin Code.

By submitting, you agree to our Terms of use and Privacy Policy

Connect With Inter-Networkz(Gits Academy)

You have reached a limit!

We only allow 20 Tutor contacts under a category. Please send us an email at support@urbanpro.com for contacting more Tutors.

You Already have an UrbanPro Account

Please Login to continue

Please Enter valid Email or Phone Number

Please Enter your Password

Please Enter valid Password or OTP

Forgot Password? Resend OTP OTP Sent

Sorry, we were not able to find a user with that username and password.

We have sent you an OTP to your register email address and registered number. Please enter OTP as Password to continue

Further Information Received

Thank you for providing more information about your requirement. You will hear back soon from the trainer

Share

course photo

CEH v8 ( Certified Ethical Hacker ) Training

Jayanagar, Bangalore

No Reviews Yet
2 Interested

About the Course


The EC Council Certified Ethical Hacker training provides a real-time environment where the students get to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. The students get trained in basic tactics like how intruders escalate privileges and what steps can be taken to secure a system. They will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others.

Topics Covered

• Module 1: Introduction to Ethical Hacking
• Module 2: Footprinting and Reconnaissance
• Module 3: Scanning Networks
• Module 4: Enumeration
• Module 5: System Hacking
• Module 6: Trojans and Backdoors
• Module 7: Viruses and Worms
• Module 8: Sniffers
• Module 9: Social Engineering
• Module 10: Denial of Service
• Module 11: Session Hijacking
• Module 12: Hacking Webservers
• Module 13: Hacking Web Applications
• Module 14: SQL Injection
• Module 15: Hacking Wireless Networks
• Module 16: Hacking Mobile Platforms
• Module 17: Evading IDS, Firewalls, and Honeypots
• Module 18: Buffer Overflow
• Module 19: Cryptography
• Module 20: Penetration Testing


Who should attend

officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Pre-requisites

No Reqisites

What you need to bring

Note Book

Key Takeaways

CEH certification opens up new doors in IT Security industry, enhances one’s professional skills and ensures clients trust in one’s expertise.Intercop’s rigorous CEH training equips you to be more than a troubleshooter, being on guard always, and in the lookout for vulnerabilities in the clients’ systems and prevent them, thereby providing a higher quality of service.
Content
Reviews
There are no Reviews yet. Be the First to Review
Questions and Comments

Thousands of experts Tutors, Trainers & other Professionals are available to answer your questions

Comment ?

Questions Guidelines

  • Start your question with simple statements like "what", "when", "where", or "how".
  • Ensure your question or answer is not offensive or insensitive - it may be voted down or banned.
  • Please provide as much detail as possible as this will allow our members to better understand and respond to your question.
  • Take some time to categorize your question. This will greatly help other users find the question.


You can add upto 6 Images

Ask


There are no Reviews yet. Be the First to Review

Date and Time

Not decided yet.

cash back100% Money Back Guarentee

About the Trainer

Multiple

Multiple


our all the trainers all Cisco certified. well verse with teaching skills.
Seats Left-

Students Interested 2

Course Id: 16708