Certified Ethical Hacker Training Course Overview:
Welcome to the Project-Based Certified Ethical Hacker (CEH) Training program. In this comprehensive training, you will gain practical experience in ethical hacking and prepare for the Certified Ethical Hacker certification. This training is designed to equip you with the skills and knowledge required to identify vulnerabilities, exploit security weaknesses, and secure systems and networks. Through a series of hands-on projects, you will learn various hacking techniques, tools, and countermeasures to protect organizations from malicious attacks.
Certified Ethical Hacker Training Course Outline:
Module 1: Introduction to Ethical Hacking
- Overview of ethical hacking and its importance in cybersecurity
- Understanding the ethical hacking process and methodology
Module 2: Footprinting and Reconnaissance
- Information gathering techniques and tools
- Footprinting, scanning, and enumeration
Module 3: Scanning Networks
- Network scanning techniques and tools
- Identifying open ports, services, and vulnerabilities
Module 4: Enumeration and System Hacking
- Enumerating system resources, user accounts, and shared resources
- Password cracking techniques and privilege escalation
Module 5: Malware Threats
- Types of malware and their characteristics
- Analyzing and combating malware threats
Module 6: Sniffing and Social Engineering
- Sniffing techniques and tools for network traffic analysis
- Social engineering tactics and defense mechanisms
Module 7: Denial of Service (DoS) Attacks
- Understanding DoS attacks and their impact
- DoS attack techniques and mitigation strategies
Module 8: Web Application Hacking
- Web application vulnerabilities and exploitation techniques
- Web application security best practices
Module 9: Wireless Network Hacking
- Wireless network vulnerabilities and attack vectors
- Securing wireless networks against hacking attempts
Module 10: Cryptography and Network Security
- Principles of cryptography and encryption algorithms
- Network security mechanisms and secure protocols
Module 11: Penetration Testing and Vulnerability Assessment
- Understanding penetration testing methodologies
- Conducting vulnerability assessments and reporting findings
- Become Job Ready
- Become an expert in the field.
- Increase earning potential.
I am Deborah Osilade, I am a Data Analyst and an Instructor at Piston and Fusion Business Academy. I love leveraging data to create high-quality data-intelligent solutions. I enjoy working on building Predictive Models, Financial models and designing Dashboards solutions. My specialization and core skills are in Finance, Data Science & Machine Learning. I have a Post Graduate Diploma in Data Science and Business Analysis from the University of Texas at Austin and a B.A. Accounting and Finance degree from Middlesex University. My proficiency with data science tools spans Programming Language for Data Science, Data visualization, and Data management tools.
Certified Ethical Hacker Training Course
Batch 1 | Batch 2 | Batch 3 | |
Date | 24th May – 2nd June
2023 |
24th May – 2nd June | 24th May – 2nd June |
Training Days | Mon & Wed | Tue & Thr | Sat |
Training Time | 9am – 12pm | 1pm – 3pm | 9am – 3pm |
Delivery Method | Classroom & Online | Hybrid | Classroom |
Location | 122a Obadina street Lagos | zoom | Microsoft Teams |
Course FAQ
.accordion-flush
class. This is the first item's accordion body..accordion-flush
class. This is the second item's accordion body. Let's imagine this being filled with some actual content..accordion-flush
class. This is the third item's accordion body. Nothing more exciting happening here in terms of content, but just filling up the space to make it look, at least at first glance, a bit more representative of how this would look in a real-world application.