This will allow students to deploy proactive countermeasures and in turn, stay ahead of information security developments and exploited vulnerabilities. With this certification, professionals will gain a valuable credential commanding a large salary. This course is also the prerequisite for the CHFI certification which will expand on the hacking techniques and lead into the area of cyber forensics and investigation. Topics included in this course are: DDOS Attacks, Detection, Policy Creation, Social Engineering, Virus Creation and Buffer Overflows to name a few.
Learning with Study 365 has many advantages. The course material is delivered straight to you and can be adapted to fit in with your lifestyle. It is created by experts within the industry, meaning you are receiving accurate information, which is up-to-date and easy to understand.
This course is comprised of professionally narrated e-Learning modules, interactive quizzes, tests, and exams. All delivered through a system that you will have access to 24 hours a day, 7 days a week for 365 days (12 months).
This online training course is comprehensive and designed to cover the key topics listed under the curriculum.
You will have 12 Months access to your online study platform from the date you purchased the course. The course is self-paced so you decide how fast or slow the training goes. You can complete the course in stages revisiting the training at any time.
Method of Assessment:
At the end of the course, learners will take an online multiple choice question assessment test (please be aware, this is not the official exam). The online test is marked straight away, so you will know immediately if you have passed the course.
Successful candidates will be awarded a certificate for Ethical Hacking Essential Training.
(This course is not included the official certificate)
Learners must be age 16 or over and should have a basic understanding of the English Language, numeracy, literacy, and ICT.
This training course will lead you to become a:
- Penetration Tester
- Cyber Security Analyst
- Ethical Hacker
- Security Architect
- Information Security Officer
- Security Consultant
- Senior Security Consultant
|Certified Ethical Hacker (CEH)||FREE||00:00:00|
|Course brochure – Certified Ethical Hacker (CEH)||FREE||00:00:00|
|1: Intro to Course|
|1. Intro – Part 1-10||00:00:00|
|2. Pretest Intro||00:00:00|
|4. Pretest Summary||00:00:00|
|5. Intro to Ethical Hacking – Part 1-9||00:00:00|
|2: Footprinting and Reconnaisssance|
|1. Footprinting & Reconnaissance – Part 1-9||00:00:00|
|3: Scanning Networks|
|1. Scanning Networks – Part 1-4||00:00:00|
|1. Enumeration – Part 1-5||00:00:00|
|5: System Hacking|
|1. System Hacking – Part 1-6||00:00:00|
|6: Trojans and Backdoors|
|1. Trojans & Backdoors – Part 1-3||00:00:00|
|7: Viruses and Worms|
|1. Viruses & Worms – Part 1-6||00:00:00|
|8: Denial of Service|
|1. Denial of Service – Part 1-4||00:00:00|
|9: Social Engineering|
|1. Social Engineering – Part 1-4||00:00:00|
|1. Sniffers – Part 1-6||00:00:00|
|11: Session Hijacking|
|1. Session Hijacking – Part 1-7||00:00:00|
|12: Hacking Webservers|
|1. Hacking Web Servers – Part 1-5||00:00:00|
|13: Hacking Web Applications|
|1. Web Application Vulnerabilities – Part 1-4||00:00:00|
|14: SQL Injection|
|1. SQL Injection – Part 1-3||00:00:00|
|15: Hacking Wireless Networks|
|1. Hacking Wireless Networks – Part 1-5||00:00:00|
|16: Evading IDS Firewalls and Honeypots|
|1. Evading IDS, Firewalls & Honeypots – Part 1-3||00:00:00|
|17: Buffer Overflow|
|1. Buffer Overflows – Part 1-5||00:00:00|
|1. Cryptography & Steganography – Part 1-7||00:00:00|
|19: Penetration Testing|
|1. Metasploit for Penertration Testing – Part 1-7||00:00:00|
|2. Business Process – Part 1-6||00:00:00|
|3. Lab Suggestions||00:00:00|
No Reviews found for this course.