Certified Ethical Hacker - CEH

The Certified Ethical Hacker (CEH) program is the most comprehensive ethical hacking course to help information security professionals grasp the fundamentals of ethical hacking.

Ethical hacking course is crucial for protecting digital systems, as it helps to detect and prevent cyberattacks that can cause serious damage in a timely manner.

Description

The hacking course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit.

The Certified Ethical Hacker (CEH) program is the most comprehensive ethical hacking course to help information security professionals grasp the fundamentals of ethical hacking. The hacking course outcome helps you become a professional who systematically attempts to inspect network infrastructures with the consent of its owner to find security vulnerabilities which a malicious hacker could potentially exploit.

Curriculum
1. Introduction to Ethical Hack
2. Footprinting and Reconnaissance
3. Scanning Networks
4. 4. Enumeration
5. Vulnerability Analysis
6. System Hacking Malware
7. MalwareThreats
8. Sniffing
9. Social Engineering
10. Denial-of-Service
11. Session Hijacking
12. Evading IDS, Firewalls, and Honeypots
13. Hacking Web Servers
14. Hacking Web Applications
15. SQL Injection
16. Hacking Wireless Networks
17. Hacking Mobile Platforms
18. IoT Hacking
19. Cloud Computing
20. Cryptography

FAQ

Target Audience

The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

Strong knowledge of networking, and computer systems.

Understanding of current security protocols for regularly used operating systems like, Linux, Windows, and Mac.

Ability to hack into network or systems on permission, to assess vulnerabilities. Able to perform preventive, corrective and protective countermeasures against malicious attempts.

Should be proficient in identifying and cracking multiple types of passwords. Know the phases and methodologies of ethical hacking.

Should know how to erase digital evidence of networks and system intrusions. Understand encryption techniques and cryptography.

Adhere to the code of ethics and perform hack under professional conduct.

Should know how to delete digital evidence from network and system takeovers.

Should understand encryption techniques and cryptography.

Should adhere to the code of ethics and perform tasks professionally.

The instruction for this training is conducted entirely in Macedonian.

During the lessons, theoretical concepts are explained, and homework assignments are given, with solutions discussed in class. Experiences from the projects that the trainees are working on are shared and possible solutions and good practices are discussed.

Certified Ethical Hacker
CEH

1.100 €​​

990 €​​

Scroll to Top