The Certified Ethical Hacker is an expert who understands how to audit and secure networks for vulnerabilities in the security configuration.
Certified Ethical Hacker Module: Certified Ethical Hacker Module:
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
Hacking Wireless Networks
Hacking Mobile Platforms
The best way is to put yourself in the opponent's point of view. Learn to see your own IT through the eyes of a potential attacker and find the security gaps in your IT. The program certifies the course participant as a vendor-neutral security expert. A trained Certified Ethical Hacker brings more to a company than basic system administrator skills. This course prepares you for the CEH exam as an EC-Council Certified Ethical Hacker.
Networking Knowledge: TCP/IP and OSI reference model; basic task and operation of Ethernet, ARP, IP, ICMP, TCP, UDP, DNS, DHCP, FTP and HTTP protocols.
Linux skills: Familiarity with Graﬁsch-based Linux systems (preferably Debian); command line usage (e.g., cat, mv, cp, rm, ﬁle, locate, grep); package management under Debian-based Linux distributions, such as Kali Linux (apt, aptget, apt-cache).
Dealing with the Windows command line: Knowledge of important system commands under Windows (start, type, ipconﬁg, netstat, arp, regedt32, etc.).
English proficiency: Since the course materials and exam are only available in English, a solid command of English (written) is required.
IT Security Officer