This class will immerse the students into an interactive environment where they will be shown how to scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class they will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam .

General Objectives

  • With CEH you will learn how to enhance your network’s defenses. You’ll begin by learning how perimeter defenses work. Then, by scanning and attacking your own network (no real networks will be harmed), you’ll learn how intruders operate and the steps you can take to secure a system.
  • In the interactive, lab-filled environment of this ethical hacking course, you will gain in-depth knowledge and practical experience with current, essential security systems. You will explore common ethical hacking topics, such as intrusion detection, policy creation, social engineering, DDoS attacks, buffer overflows, and virus creation.

Target Audience

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.

infocenter IT workshops are carefully designed to assist all IT personnel who are expected to jump right into projects implementation within a limited time frame in order to prepare and upgrade their skills. These workshops are a deep dive into the “HOW TO” scenarios, designed based on our experienced trainers. Real life examples are implemented into most of the hands-on training in a way that minimizes the gap between what is learned and what is required. This type of hands on training is mandatory to summarize the big picture of every product.

See all Infocenter Training Institute courses

Contact information not available.

Courses you can instantly connect with...
Introduction to eCommerce Gulf University for Science & Technology Computer Systems Technician Algonquin College Kuwait Principles of Network Security Gulf University for Science & Technology

Is this the right course for you?

Rate our content

Didn't find what you were looking for ?

or