Contact Us
+1 647 862 8133
Request More Information
What Is CEH?
Is the leading ethical hacking training and certification program in cybersecurity. It provides students the ability to audit a system for weaknesses and vulnerability using the same tools and exploits as malicious hackers but under a proper legal circumstance and in the best interest of assessing the security posture of a target system and organization. It teaches how hackers think and act maliciously so you can learn to better position your organization’s security infrastructure and defend against future attacks.
Why Take This Course?
After completing this course, students will be able to identify vulnerabilities in systems, networks or system infrastructure including finding and attempting to exploit any vulnerabilities to determine whether unauthorized or malicious activities are possible. Students will become part of the Red Team as an offensive security professional who are experts in attacking systems and breaking into defenses. * (purplesec.us blog).
What To Expect?
Lab time and hands-on approach to learning. Upon completion of the course, you will be equipped to take the globally recognized credential as Certified Ethical Hacker. Gain insight into ethical hacking to spot potential attack vectors and weaknesses before the hackers do. Learn how to think like a hacker and use real hacking tools, techniques, and methodologies.
Potential Job Opportunities
Cybersecurity Analyst, Network Engineer, Information Security Analyst, Cyber Defense Analyst, IT Security Administrator, Security Analyst, Network Defense Operator, Penetration Tester, Network Security Specialist, Ethical Hacker, Security Consultant, SOC Analyst, Security Auditor, Vulnerability Assessment Analyst, Technology Risk & Cybersecurity Audit
What You Will Learn
- Ethical Hacking
- Foot printing
- Reconnaissance
- Tools used by security practitioners and penetration testers across the world
- Deep dive of the NIST framework
- Cloud and IoT modules
- Multiple operation systems configured with Domain Controllers
- Firewalls
- Vulnerable web applications
- Hacking practices and skills
- Latest Malware analysis tactics for Ransomware, IoT botnet, Android malware etc
- Practical skills in a lab environment etc
Pre-requisites
Students will be required to sign a confidentiality Non-Disclosure Agreement (NDA)
Schedule (Virtual Instructor Led)
5 weeks long Monday - Friday 9:00 AM to 5:00 PM
Next Class:
On-Demand Access