Course details
The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need.
CEH is used as a hiring standard and is a core sought after certification by many of the Fortune 500 organizations, governments, cybersecurity practices, and a cyber staple in education across many of the most prominent degree programs in top Universities around the globe.
EC-Council raises the bar again for ethical hacking training and certification programs with the all new CEH v10
This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a "Hacker Mindset" in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver's seat with a hands-on training environment employing a systematic ethical hacking process.
You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.
Audience Profile
Ethical hackers, System Administrators, Network Administrators and Engineers, Webmanagers, Auditors, Security Professionals in general.
Course Outline
- Module 1: Introduction to Ethical Hacking
- Module 2: Footprinting and Reconnaissance
- Module 3: Scanning Networks
- Module 4: Enumeration
- Module 5: Vulnerability Analysis
- Module 6: System Hacking
- Module 7: Malware Threats
- Module 8: Sniffing
- Module 9: Social Engineering
- Module 10: Denial-of-Service
- Module 11: Session Hijacking
- Module 12: Evading IDS, Firewalls, and Honeypots
- Module 13: Hacking Web Servers
- Module 14: Hacking Web Applications
- Module 15: SQL Injection
- Module 16: Hacking Wireless Networks
- Module 17: Hacking Mobile Platforms
- Module 18: IoT Hacking
- Module 19: Cloud Computing
- Module 20: Cryptography
Course Location
About Iverson
Iverson Associates Sdn Bhd is the undisputed leader of professional IT training in Malaysia. Established in 1994, Iverson has helped hundreds of companies, including Fortune 500 companies, government departments and agencies, government linked corporationsas well as many of the Top 100 companies on Bursa Malaysia, to upgrade the IT skills of their employees to maximise their return on investment and gain competitive advantage.
We set the benchmark for professional IT training in Malaysia. We have the best facilities for professional IT training in Malaysia. We also have the largest pool of full-time certified trainers. We are the preferred training provider of many of the world-class companies operating in Malaysia.
Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.
See all Iverson courses- JavaScript Full stack web developer virtual internship Virtual Bootcamp + Internship at LaimoonAED 1,449Duration: Upto 30 Hours
- IT Security & Ethical Hacking Course CentralMYR 99
MYR 676Duration: Upto 11 Hours - MYR 104
MYR 518Duration: 14 Hours