RE125
Information technology

Certified Ethical Hacker: Ethical hacking and countermeasures



Certified Ethical Hacker provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so that you will be better positioned to set up your security infrastructure and defend future attacks. Understanding system weaknesses and vulnerabilities help organizations strengthen their system security controls to minimize the risk of an incident. CEH was built to incorporate a hands-on environment and systematic process across every ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to perform the job of an ethical hacker. You will be exposed to an entirely different posture towards the responsibilities and measures required to be secure. In its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies.

Objectives

At the end of this training, the participant will have a better understanding of the weaknesses and vulnerabilities of the systems and will be able to help his organization to reinforce the security controls of its systems in order to minimize the risk of incident.

Is it for you ?

Information Security Analyst / Administrator, Information Assurance (IA) Security Officer, Information Security Manager / Specialist, Information Systems Security Engineer / Manager, Information Security Professionals / Officers, Information Security / IT Auditors, Risk / Threat/Vulnerability Analyst, System Administrators, Network Administrators and Engineers

Prerequisite

Computer Networking Skills (Network+)

Content

Introduction to ethical hacking and penetration testing

The main challenges that occupy the world of computer security, ethical hacking, controls, laws and standards in information security

Footprinting and recognition

How to perform data collection (footprinting) and reconnaissance using the latest collection techniques and tools required for penetration testing.

See more + / -

Network Analysis

Network analysis techniques and analysis countermeasures.

Access (enumeration)

System access techniques taking advantage of previously identified vulnerabilities and countermeasures.

Vulnerability scanning

Identify security vulnerabilities in the target organization's network, communication infrastructure and endpoints.

System hacking

Systems hacking methodology, steganography, steganalysis attacks, and covering one's tracks to discover system and network vulnerabilities.

Malware Threats

Overview of different types of malware (Trojans, viruses, worms, etc.), auditing of systems in anticipation of malware attacks, malware analysis and countermeasures.

Sniffing

Discovering network vulnerabilities and countermeasures to prevent sniffing.

Social engineering

Extortion techniques by establishing a false link of trust with the target (e.g. impersonating technical support). How to audit vulnerabilities at the human level to prevent them.

Denial of Service

DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures

Session hijacking

Session hijacking techniques by infiltrating at the application (http) or network (TCP) level, corrupting authentication/authorization, taking advantage of encryption weaknesses and countermeasures.

Bypassing

Techniques for bypassing firewalls, intrusion detection systems and honeypots, tools and techniques for checking network perimeter weaknesses, and countermeasures.

Web server hacking

Comprehensive attack methodology for checking web server infrastructure vulnerabilities, and countermeasures.

Web application hacking

Penetration testing, security audit, vulnerability assessment and penetration testing roadmap.

SQL Injection

SQL injection attack techniques to modify or retrieve data by interfering with SQL statements, injection detection tools to detect SQL injection attempts, and countermeasures.

Wireless Network Hacking

Wireless encryption, wireless hacking methodology, wireless hacking tools, and Wi-Fi security tools.

Hacking of mobile platforms

Attack vector , Android vulnerability exploitation, mobile security guidelines and tools.

IoT and OT hacking

Threats to Internet of Things related platforms and operational technology (device performance tracking and monitoring) learn to defend IoT and IoT devices securely.

Cloud computing

Cloud computing concepts (container technology, serverless computing), various threats/attacks, and security techniques and tools.

Cryptography

Notes

Cost of the exam included

💡 Useful information

Our training sessions are offered in Montreal or Quebec City, in person or in virtual format. Dates and locations are provided when you select your session below. If you have any questions regarding registration, schedules, the language of instruction, or cancellation policies, please consult our FAQ .

Duration
5 days
Schedule
9h to 16h
Regular fee
$3,850
Preferential fee A preferential rate is offered to public institutions, to members of certain professional organizations as well as to companies that do a certain amount of business with Technologia. To know more, please read the "Registration and rates" section on our FAQ page. Please note that preferential rates are not available for online training courses. Discounts cannot be combined with other offers.
$3,465
Private or personalized training

Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.

Request a quote

Request in-company training

Do you have several employees interested in the same training course? Whether in person at your offices or remotely in virtual mode, we offer private training courses tailored to your team's needs. Group rates are available. Contact us for more details or request a quote online.

Tell us more
Added to cart View my cart