CEH : Certified Ethical Hacking v10 Iverson
Price: MYR 6,200

    Course details

    The Certified Ethical Hacker (CEH v10) program is a trusted and respected ethical hacking training Program that any information security professional will need.

    CEH is used as a hiring standard and is a core sought after certification by many of the Fortune 500 organizations, governments, cybersecurity practices, and a cyber staple in education across many of the most prominent degree programs in top Universities around the globe. 

    EC-Council raises the bar again for ethical hacking training and certification programs with the all new CEH v10 

    This course in its 10th iteration, is updated to provide you with the tools and techniques used by hackers and information security professionals alike to break into any computer system. This course will immerse you into a "Hacker Mindset" in order to teach you how to think like a hacker and better defend against future attacks. It puts you in the driver's seat with a hands-on training environment employing a systematic ethical hacking process.

    You are constantly exposed to creative techniques of achieving optimal information security posture in the target organization; by hacking it! You will learn how to scan, test, hack and secure target systems. The course covers the Five Phases of Ethical Hacking, diving into Reconnaissance, Gaining Access, Enumeration, Maintaining Access, and covering your tracks.

    Audience Profile

    Ethical hackers, System Administrators, Network Administrators and Engineers, Webmanagers, Auditors, Security Professionals in general.

    Course Outline 

    • Module 1: Introduction to Ethical Hacking 
    • Module 2: Footprinting and Reconnaissance 
    • Module 3: Scanning Networks 
    • Module 4: Enumeration 
    • Module 5: Vulnerability Analysis 
    • Module 6: System Hacking 
    • Module 7: Malware Threats 
    • Module 8: Sniffing 
    • Module 9: Social Engineering 
    • Module 10: Denial-of-Service 
    • Module 11: Session Hijacking 
    • Module 12: Evading IDS, Firewalls, and Honeypots 
    • Module 13: Hacking Web Servers 
    • Module 14: Hacking Web Applications 
    • Module 15: SQL Injection 
    • Module 16: Hacking Wireless Networks 
    • Module 17: Hacking Mobile Platforms 
    • Module 18: IoT Hacking 
    • Module 19: Cloud Computing 
    • Module 20: Cryptography

    Updated on 06 November, 2018

    Job roles this course is suitable for:

    Ethical Hacker , System Analyst , System Administrator

    About Iverson

    Iverson Associates Sdn Bhd is the undisputed leader of professional IT training in Malaysia. Established in 1994, Iverson has helped hundreds of companies, including Fortune 500 companies, government departments and agencies, government linked corporationsas well as many of the Top 100 companies on Bursa Malaysia, to upgrade the IT skills of their employees to maximise their return on investment and gain competitive advantage.

    We set the benchmark for professional IT training in Malaysia. We have the best facilities for professional IT training in Malaysia. We also have the largest pool of full-time certified trainers. We are the preferred training provider of many of the world-class companies operating in Malaysia.

    Training is not a commodity – all training centres are not the same. Iverson Associates Sdn Bhd is the most established, the most reputable, and the top professional IT training provider in Malaysia. With a large pool of experienced and certified trainers, state-of-the-art facilities, and well-designed courseware, Iverson offers superior training, a more impactful learning experience and highly effective results.

    See all Iverson courses
    Courses you can instantly connect with... Do an online course on Certified Ethical Hacker (CEH) starting now. See all courses

    Is this the right course for you?

    Rate this page

    Didn't find what you were looking for ?

    or