ICT Conference 2019
  • HOME
  • Speakers
  • Agenda
  • Sponsorship
  • About
    • Contact
    • Gallery
    • Conferences >
      • PARTICIPANTS AT THE PREVIOUS ​ICT SECURITY CONFERENCES
      • THIRD ICT SECURITY CONFERENCE >
        • Presentations
        • Agenda.pdf
        • Lectures >
          • IT Audit, Risks, Security
          • Internet Security Threat Report
          • Cyber Security And Cyber Crime
          • ATM Security
          • ​Enhancing Security of Electronic Payments - Decision IQ
          • Security in Smart metering - Smart Grid
          • Cloud Based NFC Mobile Payments - Security Risks and Protection Measures
          • How to Protect Confidential Information?
          • Implementation of „SSL for ado.net“ for Encryption of the Data in Transit in the Corporate Network
          • Linux, Open Source and Security
          • Anatomy of a Social Engineering Attack
          • Endpoint Protection, New Technologies That Are Replacing/Complementing Traditional Antivirus
          • App Centric Computing - Impact on Your IT
          • Tor Network - How to Achieve Anonymity?
          • Secure Printing
          • Microsoft Advanced Threat Analytics
          • Creating WiFi NSA station
          • The Safety of Cryptography
          • The Problem of Protecting Security of Persons and Property in Light of Development of Internet of Things
        • Speakers >
          • Ph.D. Zoran Jovanovic
          • Slobodan Nedeljkovic
          • Nebojsa Cvijetic
          • Davor Kodrnja
          • Filip Bojovic
          • Ivan Dragas
          • Ivan Stijovic
          • Krzysztof Graczek
          • Nenad Andrejevic
          • Bojan Pavlovic
          • Luka Milinkovic
          • Darko Mihajlovski
          • Srdjan Popovic
          • Jovan Sikanja
          • Vladimir Vucinic
          • Bojan Milovanovic
          • Ph.D. Zoran Cica
          • Dragan Petrovic
          • Mirad Maglic
          • Milan Gabor
          • Ph.D. Zarko Stanisavljevic
          • Ph.D. Dragan Djurdjevic
          • Filip Simeonov
          • Mane Piperevski
        • Workshops >
          • What Code Come In Must Come Out - Threats at iOS and Android Applications
          • Hacking Attacks - The Power of IPv6 Driven Malware
      • Second ICT Security Conference >
        • Luka Milinkovic1
        • Viktor Kanizai
        • Viktor Varga - Saga
        • Dejan Spasic
        • Halkbank
        • Ivan Dragas
        • Piperevski
        • Zakljucak konferencije 2015
        • Zbornik radova
        • Halcom i svecano otvaranje
      • First ICT Security Conference
      • FOURTH ICT SECURITY CONFERENCE >
        • Lecturers
        • Speakers
        • Video
        • Sponsors
      • Blog

CEH v.8
Certified Ethical Hacker
Belgrade - CEIB - 23. - 27. March 2015th
Price: 1.700 US $
Training + Courseware + Lab + Exam
Price: 1.800 US $
Training + Courseware + Exam + Lab +
 ICT Security conference 2015


Duration
5 days (9:00 – 5:00)

Target Audience
This course will significantly benefit security officers,
auditors, security professionals, site administrators,
and anyone who is concerned about the integrity of
their network infrastructure.

Students going through CEH training will
learn:

1. Key issues plaguing the information security
world, incident management process, and
penetration testing
2. Various types of footprinting, footprinting
tools, and countermeasures
3. Network scanning techniques and scanning
countermeasures
4. Enumeration techniques and enumeration
countermeasures
5. System hacking methodology, steganography,
steganalysis attacks, and covering tracks
6. Different types of Trojans, Trojan analysis, and
Trojan countermeasures
7. Working of viruses, virus analysis, computer
worms, malware analysis procedure, and
countermeasures
8. Packet sniffing techniques and how to defend
against sniffing
9. Social Engineering techniques, identify theft,
and social engineering countermeasures
10. DoS/DDoS attack techniques, botnets, DDoS
attack tools, and DoS/DDoS countermeasures
11. Session hijacking techniques and
countermeasures
12. Different types of webserver attacks, attack
methodology, and countermeasures
C E H
TM
13. Different types of web application attacks,
web application hacking methodology, and
countermeasures
14. SQL injection attacks and injection detection
tools
15. Wireless Encryption, wireless hacking
methodology, wireless hacking tools, and wi-fi
security tools
16. Mobile platform attack vector, android
vulnerabilities, jailbreaking iOS, windows
phone 8 vulnerabilities, mobile security
guidelines, and tools
17. Firewall, IDS and honeypot evasion techniques,
evasion tools, and countermeasures
18. Various types of buffer overflows, how to
mutate a buffer overflow exploit, buffer
overflow detection tools, and countermeasures
19. Different types of cryptography ciphers, Public
Key Infrastructure (PKI), cryptography attacks,
and cryptanalysis tools
20. Various types of penetration testing,
security audit, vulnerability assessment, and
penetration testing roadmap

Location

Become part of ICT Security conference

5th ICT Security Conference gathers leading experts in cybersecurity, digital forensics, cryptography, network and data security, ethical hacking and fraud prevention. We strive to provide our delegates top-of-the-line content and hands-on experence.

Contact Us

    Subscribe Today!

Submit