CEH v.8
Certified Ethical Hacker
Belgrade - CEIB - 23. - 27. March 2015th
Price: 1.700 US $
Training + Courseware + Lab + Exam
Price: 1.800 US $
Training + Courseware + Exam + Lab + ICT Security conference 2015
Duration
5 days (9:00 – 5:00)
Target Audience
This course will significantly benefit security officers,
auditors, security professionals, site administrators,
and anyone who is concerned about the integrity of
their network infrastructure.
Students going through CEH training will
learn:
1. Key issues plaguing the information security
world, incident management process, and
penetration testing
2. Various types of footprinting, footprinting
tools, and countermeasures
3. Network scanning techniques and scanning
countermeasures
4. Enumeration techniques and enumeration
countermeasures
5. System hacking methodology, steganography,
steganalysis attacks, and covering tracks
6. Different types of Trojans, Trojan analysis, and
Trojan countermeasures
7. Working of viruses, virus analysis, computer
worms, malware analysis procedure, and
countermeasures
8. Packet sniffing techniques and how to defend
against sniffing
9. Social Engineering techniques, identify theft,
and social engineering countermeasures
10. DoS/DDoS attack techniques, botnets, DDoS
attack tools, and DoS/DDoS countermeasures
11. Session hijacking techniques and
countermeasures
12. Different types of webserver attacks, attack
methodology, and countermeasures
C E H
TM
13. Different types of web application attacks,
web application hacking methodology, and
countermeasures
14. SQL injection attacks and injection detection
tools
15. Wireless Encryption, wireless hacking
methodology, wireless hacking tools, and wi-fi
security tools
16. Mobile platform attack vector, android
vulnerabilities, jailbreaking iOS, windows
phone 8 vulnerabilities, mobile security
guidelines, and tools
17. Firewall, IDS and honeypot evasion techniques,
evasion tools, and countermeasures
18. Various types of buffer overflows, how to
mutate a buffer overflow exploit, buffer
overflow detection tools, and countermeasures
19. Different types of cryptography ciphers, Public
Key Infrastructure (PKI), cryptography attacks,
and cryptanalysis tools
20. Various types of penetration testing,
security audit, vulnerability assessment, and
penetration testing roadmap
Certified Ethical Hacker
Belgrade - CEIB - 23. - 27. March 2015th
Price: 1.700 US $
Training + Courseware + Lab + Exam
Price: 1.800 US $
Training + Courseware + Exam + Lab + ICT Security conference 2015
Duration
5 days (9:00 – 5:00)
Target Audience
This course will significantly benefit security officers,
auditors, security professionals, site administrators,
and anyone who is concerned about the integrity of
their network infrastructure.
Students going through CEH training will
learn:
1. Key issues plaguing the information security
world, incident management process, and
penetration testing
2. Various types of footprinting, footprinting
tools, and countermeasures
3. Network scanning techniques and scanning
countermeasures
4. Enumeration techniques and enumeration
countermeasures
5. System hacking methodology, steganography,
steganalysis attacks, and covering tracks
6. Different types of Trojans, Trojan analysis, and
Trojan countermeasures
7. Working of viruses, virus analysis, computer
worms, malware analysis procedure, and
countermeasures
8. Packet sniffing techniques and how to defend
against sniffing
9. Social Engineering techniques, identify theft,
and social engineering countermeasures
10. DoS/DDoS attack techniques, botnets, DDoS
attack tools, and DoS/DDoS countermeasures
11. Session hijacking techniques and
countermeasures
12. Different types of webserver attacks, attack
methodology, and countermeasures
C E H
TM
13. Different types of web application attacks,
web application hacking methodology, and
countermeasures
14. SQL injection attacks and injection detection
tools
15. Wireless Encryption, wireless hacking
methodology, wireless hacking tools, and wi-fi
security tools
16. Mobile platform attack vector, android
vulnerabilities, jailbreaking iOS, windows
phone 8 vulnerabilities, mobile security
guidelines, and tools
17. Firewall, IDS and honeypot evasion techniques,
evasion tools, and countermeasures
18. Various types of buffer overflows, how to
mutate a buffer overflow exploit, buffer
overflow detection tools, and countermeasures
19. Different types of cryptography ciphers, Public
Key Infrastructure (PKI), cryptography attacks,
and cryptanalysis tools
20. Various types of penetration testing,
security audit, vulnerability assessment, and
penetration testing roadmap