Description
Description
What is an Ethical Hacker?
- An ethical hacker is a computer and network expert who attacks a security system on behalf of its owners, seeking vulnerabilities that a malicious hacker could exploit.
- To test a security system, ethical hackers use the same methods as their less principled counterparts, but report problems instead of taking advantage of them.
- Ethical hacking is also known as penetration testing, intrusion testing and red teaming.
Abstract
- Certified Ethical Hacking (C|EH) V13 training provides a comprehensive ethical hacking and network security- training program to meet the standards of highly skilled security professionals.
- This is the world’s most advanced ethical hacking course with 19 of the most current security domains any ethical hacker will ever want to know when they are planning to beef up the information security posture of their organisation.
- The Certified Ethical Hacker certification will fortify the application knowledge of security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure.
- The CEH class deals with real life scenarios and threats and will ensure that attendees understand how to look for weaknesses and vulnerabilities in a target system.
Objectif
The CEH training course is composed of 19 modules that will be covered over the 5 days:
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- System Hacking
- Trojans and Backdoors
- Viruses and Worms
- Sniffers
- Social Engineering
- Denial of Service
- Session Hijacking Hacking
- Webservers Hacking Web
- Applications
- SQL Injection
- Hacking Wireless Networks
- Evading IDS, Firewalls, and Honeypots
- Buffer Overflow
- Cryptography
- Penetration Testing
Programme
Day 1
- Key issues plaguing the information security world, incident management process, and penetration testing
- Various types of footprinting, footprinting tools, and countermeasures
- Network scanning techniques and scanning countermeasures
- Enumeration techniques and enumeration countermeasures
Day 2
- System hacking methodology, steganography, steganalysis attacks, and covering tracks
- Different types of Trojans, Trojan analysis, and Trojan countermeasures
- Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
- Packet sniffing techniques and how to defend against sniffing
Day 3
- Social Engineering techniques, identify theft, and social engineering countermeasures
- DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures
- Session hijacking techniques and countermeasures
- Different types of webserver attacks, attack methodology, and countermeasures
- Different types of web application attacks, web application hacking methodology, and countermeasures
Day 4
- SQL injection attacks and injection detection tools
- Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wireless security tools
- Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools
Day 5
- Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures
- Various cloud computing concepts, threats, attacks, and security techniques and tools
- Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
- Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
Target Audience
The Certified Ethical Hacking training course will significantly benefit those who are involved in, or responsible for, Computer Forensics Investigations:
- IT Security Officers
- Network Administrators
- Members of the Information Security Team
- Site Administrators
- Anyone dealing with network infrastructure integrity
Packs
5 Days course
Includes 5 days of training
5 Days + examen Lite
Includes 5 days of training and eCourseware + Exam Voucher + Ethical Hacking Video Library
5 Days + examen Elite
Includes 5 days of training and eCourseware + Exam Voucher + Ethical Hacking Video Library + 6 Months of Official Labs + CEH practical exam + 1 Exam retake + CEH engage + Annual CEH Challenge Pass
Conditions
Course Material
The training material will be handed out at the beginning of the course.
Certificat
This course prepares you for the EC-Council Certified Ethical Hacker (312-50) exam. A voucher will be provided.
Location
L-8308 Capellen
Luxembourg
Sessions et horaires
-
Mon 10.11.2025
09:00 à 18:00
8H
Certified Ethical Hacking (C|EH) V13
Business Training Luxembourg SA
-
Tue 11.11.2025
09:00 à 18:00
8H
Certified Ethical Hacking (C|EH) V13
Business Training Luxembourg SA
-
Wed 12.11.2025
09:00 à 18:00
8H
Certified Ethical Hacking (C|EH) V13
Business Training Luxembourg SA
-
Thu 13.11.2025
09:00 à 18:00
8H
Certified Ethical Hacking (C|EH) V13
Business Training Luxembourg SA
-
Fri 14.11.2025
09:00 à 18:00
8H
Certified Ethical Hacking (C|EH) V13
Business Training Luxembourg SA