Formation CEH (Certified Ethical Hacker) v12
Présentiel ou à distance
Disponible en Français et Anglais
Intermédiaire
5 jours
La formation EC-Council Certified Ethical Hacker (CEH), est un cours qui vous apportera tous les éléments dont vous aurez besoin aussi bien pour construire votre carrière en Ethical Hacking que pour réussir la certification CEH mondialement reconnue dans le domaine de la cyber sécurité.
Le programme de cette formation est alignée sur la dernière version de la certification (CEH v12).
Objectifs
Audience
Prérequis
Points forts
Objectifs
- Réussir la certification CEH v12
- Comprendre les domaines ci-dessous:
- Ethical hacking concepts, cyber kill chain concepts, an overview of information security, security controls, and various laws and regulations related to information security.
- Footprinting concepts and methodologies and utilizing footprinting tools along with the countermeasures
- Performing network scans, host and port discovery by utilizing different scanning tools
- Enumeration techniques that now includes NFS enumeration and related tools, DNS cache snooping, and DNSSEC Zone walking along with the countermeasures
- Concepts of vulnerability assessment, its types, and solutions along with a hands-on experience of industrial tools used
- Phases of system hacking, attacking techniques to obtain, escalate, and maintain access on victim along with covering tracks.
- Malware threats, analysis of various viruses, worms and trojans like Emotet and battling them to prevent data. APT and Fileless Malware concepts have been introduced to this domain.
- Packet sniffing concepts, techniques, and protection against the same.
- Social engineering concepts and related terminologies like identity theft, impersonation, insider threats, social engineering techniques, and countermeasures
- Denial of Service (DoS) and Distributed Denial of Service (DDoS) attacks, use cases, and attack and defence tools
- Security solutions like firewall, IPS, honeypots, their evasion, and protection
- Web server and web application-based attacks, methodologies
- SQL injection, hijacking, and evasion techniques
- Wireless encryption, wireless hacking, and Bluetooth hacking-related concepts
- Mobile device management, mobile platform attack vectors, and vulnerabilities related to Android and iOS systems
- Operational Technology (OT) essentials, threats, attack methodologies and attack prevention. The concept of OT is a new addition.
- Recognizing the vulnerabilities in IoT and ensuring the safety of IoT devices
- Encryption algorithms, Public Key Infrastructure (PKI), cryptographic attacks, and cryptanalysis
- Cloud computing, threats and security, essentials of container technology and serverless computing
Audience
- Ethical Hackers
- Administrateurs système
- Administrateurs réseau
- Auditeurs
- Professionnels de la sécurité
- Administrateurs Web
Prérequis
- Connaissances réseau de base
Points forts
- Conforme au cursus de la formation CEH officielle
- Labs pratiques en ligne accessibles 24h/24
- Formation interactive
- Formateur expert
Plan du cours
- Module 01: Introduction to Ethical Hacking
- Module 02: Footprinting and Reconnaissance
- Module 03: Scanning Networks
- Module 04: Enumeration
- Module 05: Vulnerability Analysis
- Module 06: System Hacking
- Module 07: Malware Threats
- Module 08: Sniffing
- Module 09: Social Engineering
- Module 10: Denial-of-Service
- Module 11: Session Hijacking
- Module 12: Evading IDS, Firewalls, and Honeypots
- Module 13: Hacking Web Servers
- Module 14: Hacking Web Applications
- Module 15: SQL Injection
- Module 16: Hacking Wireless Networks
- Module 17: Hacking Mobile Platforms
- Module 18: IoT & OT Hacking
- Module 19: Cloud Computing
- Module 20: Cryptography
Demande d'inscription
Envoyez-nous un message et notre équipe commerciale vous contactera très rapidement.