Präsenzreihe
The Certified Ethical Hacker is an expert who understands how to audit and secure networks for vulnerabilities in the security configuration.
Certified Ethical Hacker Module: Certified Ethical Hacker Module:
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT Hacking
Cloud Computing
Cryptography
The best way is to put yourself in the opponent's point of view. Learn to see your own IT through the eyes of a potential attacker and find the security gaps in your IT. The program certifies the course participant as a vendor-neutral security expert. A trained Certified Ethical Hacker brings more to a company than basic system administrator skills. This course prepares you for the CEH exam as an EC-Council Certified Ethical Hacker.
Networking Knowledge: TCP/IP and OSI reference model; basic task and operation of Ethernet, ARP, IP, ICMP, TCP, UDP, DNS, DHCP, FTP and HTTP protocols.
Linux skills: Familiarity with Grafisch-based Linux systems (preferably Debian); command line usage (e.g., cat, mv, cp, rm, file, locate, grep); package management under Debian-based Linux distributions, such as Kali Linux (apt, aptget, apt-cache).
Dealing with the Windows command line: Knowledge of important system commands under Windows (start, type, ipconfig, netstat, arp, regedt32, etc.).
English proficiency: Since the course materials and exam are only available in English, a solid command of English (written) is required.
IT Security Officer
System administrators