Certified Ethical Hacker V10 + Examen [CEH]

Tijdsduur
Startdatum en plaats
Logo van Global Knowledge - beste IT opleider volgens IDG
Opleiderscore: starstarstarstarstar_border 8,1 Global Knowledge - beste IT opleider volgens IDG heeft een gemiddelde beoordeling van 8,1 (uit 21 ervaringen)

Tip: meer info over het programma, startdatum, prijs, en inschrijven? Download de brochure!

10
Gemiddeld cijfer voor Certified Ethical Hacker V10 + Examen [CEH]
Gebaseerd op 1 ervaring Lees alle ervaringenchevron_right
Erik van der Leek
starstarstarstarstar
Erik van der Leek
Business Development Manager Benelux - IBM & Cyber Security
10
Certified Ethical Hacker V10 + Examen [CEH]

"Zeer goede training, goede content en zeer deskundige trainer. Waardevolle training voor iedereen die zich wil ontwikkelen op het gebied van cybersecurity. Global Knowledge heeft een goede locatie en veel beschikbare data" - 10-04-2018 12:53

"Zeer goede training, goede content en zeer deskundige trainer. Waardevolle training voor iedereen die zich wil ontwikkelen op het gebied van… alles lezen - 10-04-2018 12:53

Beste Erik, dank je voor je review. We hopen je binnenkort weer te mogen ontmoeten voor een nieuwe training.

- 10-04-2018 12:53

Startdata en plaatsen

Eindhoven (Evoluon Noord Brabantlaan 1)
19 aug. 2019 tot 23 aug. 2019
Zoetermeer (Centrum West 21)
2 sep. 2019 tot 6 sep. 2019
Apeldoorn (Schalterdalweg 18 Beekbergen)
16 sep. 2019 tot 20 sep. 2019
Rotterdam (Barbizonlaan 25)
23 sep. 2019 tot 27 sep. 2019
Eindhoven (Evoluon Noord Brabantlaan 1)
7 okt. 2019 tot 11 okt. 2019
Drachten (Amperelaan 1c)
14 okt. 2019 tot 18 okt. 2019
Nieuwegein (Iepenhoeve 5)
21 okt. 2019 tot 25 okt. 2019
Amsterdam (Kingsfordweg 43)
4 nov. 2019 tot 8 nov. 2019
Eindhoven (Evoluon Noord Brabantlaan 1)
11 nov. 2019 tot 15 nov. 2019
Zoetermeer (Centrum West 21)
18 nov. 2019 tot 22 nov. 2019
Nieuwegein (Iepenhoeve 5)
25 nov. 2019 tot 29 nov. 2019
Zwolle (ITPH, Grote Voort 291)
2 dec. 2019 tot 6 dec. 2019
Amsterdam (Kingsfordweg 43)
9 dec. 2019 tot 13 dec. 2019
Nieuwegein (Iepenhoeve 5)
16 dec. 2019 tot 20 dec. 2019
Nieuwegein (Iepenhoeve 5)
6 jan. 2020 tot 10 jan. 2020
Zoetermeer (Centrum West 21)
20 jan. 2020 tot 24 jan. 2020
Amsterdam (Kingsfordweg 43)
27 jan. 2020 tot 31 jan. 2020
Apeldoorn (Schalterdalweg 18 Beekbergen)
3 feb. 2020 tot 7 feb. 2020
Drachten (Amperelaan 1c)
3 feb. 2020 tot 7 feb. 2020
Nieuwegein (Iepenhoeve 5)
10 feb. 2020 tot 14 feb. 2020

Beschrijving

OVERVIEW

Het CEH - Certified Ethical Hacker - certificaat geeft u internationale erkenning (vanuit EC-Council) als security professional. Het CEH examen voucher is bij de 5 daagse cursus inbegrepen en vormt de eerste stap richting CEH Master.

OBJECTIVES

A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems. A Ethical Hacker uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral per…

Lees de volledige beschrijving

Veelgestelde vragen

Er zijn nog geen veelgestelde vragen.  

Nog niet gevonden wat je zocht? Bekijk deze onderwerpen: Ethical Hacking, ASL foundation, Penetration testing, Security awareness en Crypto.

OVERVIEW

Het CEH - Certified Ethical Hacker - certificaat geeft u internationale erkenning (vanuit EC-Council) als security professional. Het CEH examen voucher is bij de 5 daagse cursus inbegrepen en vormt de eerste stap richting CEH Master.

OBJECTIVES

A Certified Ethical Hacker (CEH) is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems. A Ethical Hacker uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

This course will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment.

This ethical hacking course puts you in the driver’s seat of a hands-on environment with a systematic process. Here, you will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! You will scan, test, hack and secure your own systems. You will be taught the five phases of ethical hacking and the ways to approach your target and succeed at breaking in every time! The five phases include Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

The Certified Ethical Hacker course is regularly updated to ensure you are aware of the latest tools and techniques used by hackers and information security professionals. .

A Pearson Vue exam voucher is included, although you will need to schedule the exam at a Pearson Vue testing faclity. An additional 6 months access to the CEHv10 (iLabs) is provided once you have completed the course.

During this course you should learn the:

  • Key issues plaguing the information security world, incident management process, and penetration testing.
  • Various types of footprinting, footprinting tools, and countermeasures.
  • Network scanning techniques and scanning countermeasures.
  • Enumeration techniques and enumeration countermeasures.
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks.
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures.
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures.
  • Packet sniffing techniques and how to defend against sniffing.
  • Social Engineering techniques, identify theft, and social engineering countermeasures.
  • DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures.
  • Session hijacking techniques and countermeasures.
  • Different types of webserver attacks, attack methodology, and countermeasures.
  • Different types of web application attacks, web application hacking methodology, and countermeasures.
  • SQL injection attacks and injection detection tools.
  • Wireless Encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.
  • Mobile platform attack vector, android vulnerabilities, mobile security guidelines, and tools.
  • Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures.
  • Various cloud computing concepts, threats, attacks, and security techniques and tools.
  • Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools.
  • Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap.
  • Perform vulnerability analysis to identify security loopholes in the target organization’s network, communication infrastructure, and end systems.
  • Different threats to IoT platforms and learn how to defend IoT devices securely.

AUDIENCE

The Certified Ethical Hacking training course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

CERTIFICATION

Following this course, you could aspire to the prestigious Certified Ethical Hacker Master certification:

1. Become a Certified Ethical Hacker - an exam voucher for this exam is included with the course (exam 312-50, 4 hours, multiple choice)

2. Take the Certified Ethical Hacker Practical - this is a test by which you can demonstrate your skills by completing challenges (6 hours, proctored exam so you can take it at home or at your office). See https://www.globalknowledge.com/nl-NL/Products/EC-Council/CEH-PRAC for details.

Passing both exams will grant you the Certified Ethical Hacker Master certification.

NEXT STEP

The following couses are recommended for further study:

  • Hone and validate your skills further by taking the new CEH (Practical) exam. Once you pass the CEH and CEH Practical exams, you will become CEH Master.
  • ECSA - EC-Council Certified Security Analyst (ECSA): Acquire even more advanced Penetration Testing skills

CONTENT

Introduction to Ethical Hacking

  • Information Security Overview
  • Information Security Threats and Attack Vectors
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Penetration Testing Concepts
  • Information Security Laws and Standards

Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Competitive Intelligence
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Countermeasures
  • Footprinting Pen Testing

Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Scanning Techniques
  • Scanning Beyond IDS and Firewall
  • Banner Grabbing
  • Draw Network Diagrams
  • Scanning Pen Testing

Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures
  • Enumeration Pen Testing

Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Assessment Solutions
  • Vulnerability Scoring Systems
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports

System Hacking

  • System Hacking Concepts
  • Cracking Passwords
  • Escalating Privileges
  • Executing Applications
  • Hiding Files
  • Covering Tracks
  • Penetration Testing

Malware Threats

  • Malware Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Malware Analysis
  • Countermeasures
  • Anti-Malware Software
  • Malware Penetration Testing

Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Countermeasures
  • Sniffing Detection Techniques
  • Sniffing Pen Testing

Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Countermeasures
  • Social Engineering Pen Testing

Denial-of-Service

  • DoS/DDoS Concepts
  • DoS/DDoS Attack Techniques
  • Botnets
  • DDoS Case Study
  • DoS/DDoS Attack Tools
  • Countermeasures
  • DoS/DDoS Protection Tools
  • DoS/DDoS Penetration Testing

Session Hijacking

  • Session Hijacking Concepts
  • Application Level Session Hijacking
  • Network Level Session Hijacking
  • Session Hijacking Tools
  • Countermeasures
  • Penetration Testing

Evading IDS, Firewalls, and Honeypots

  • IDS, Firewall and Honeypot Concepts
  • IDS, Firewall and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures
  • Penetration Testing

Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Tools
  • Countermeasures
  • Patch Management
  • Web Server Security Tools
  • Web Server Pen Testing

Hacking Web Applications

  • Web App Concepts
  • Web App Threats
  • Hacking Methodology
  • Web App Hacking Tools
  • Countermeasures
  • Web App Security Testing Tools
  • Web App Pen Testing

SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • Countermeasures

Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Countermeasures
  • Wireless Security Tools
  • Wireless Pen Testing

Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Spyware
  • Mobile Device Management
  • Mobile Security Guidelines and Tools
  • Mobile Pen Testing

IoT Hacking

  • IoT Concepts
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Hacking Tools
  • Countermeasures
  • IoT Pen Testing

Cloud Computing

  • Cloud Computing Concepts
  • Cloud Computing Threats
  • Cloud Computing Attacks
  • Cloud Security
  • Cloud Security Tools
  • Cloud Penetration Testing

Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Countermeasures

Bij Global Knowledge worden de klassikale trainingen gegeven door trainers die ook werkelijk expertise hebben: hooggekwalificeerde instructeurs die allen een pedagogische achtergrond hebben en hun praktijkervaring meenemen naar het klaslokaal. Trainers bij Global Knowledge hebben oog voor de persoonlijke leerstijlen om zo de trainingservaring van de cursisten te optimaliseren.

10
Gemiddeld cijfer voor Certified Ethical Hacker V10 + Examen [CEH]
Gebaseerd op 1 ervaring
Erik van der Leek
starstarstarstarstar
Erik van der Leek
Business Development Manager Benelux - IBM & Cyber Security
10
Certified Ethical Hacker V10 + Examen [CEH]

"Zeer goede training, goede content en zeer deskundige trainer. Waardevolle training voor iedereen die zich wil ontwikkelen op het gebied van cybersecurity. Global Knowledge heeft een goede locatie en veel beschikbare data" - 10-04-2018 12:53

"Zeer goede training, goede content en zeer deskundige trainer. Waardevolle training voor iedereen die zich wil ontwikkelen op het gebied van… alles lezen - 10-04-2018 12:53

Beste Erik, dank je voor je review. We hopen je binnenkort weer te mogen ontmoeten voor een nieuwe training.

- 10-04-2018 12:53

Er zijn nog geen veelgestelde vragen.  

Download gratis en vrijblijvend de informatiebrochure

Aanhef
(optioneel)
(optioneel)
(optioneel)
(optioneel)
infoEr is een telefoonnummer vereist om deze informatieaanvraag in behandeling te nemen. (optioneel)
(optioneel)
(optioneel)
(optioneel)

Heb je nog vragen?

(optioneel)
We slaan je gegevens op om je via e-mail en evt. telefoon verder te helpen.
Meer info vind je in ons privacybeleid.