Overview

C|EH is the world’s most advanced ethical hacking course covering 20 of the most important security domains any individual will need when they are planning to beef-up the information security posture of their organization. The course provides hacking techniques and tools used by hackers and information security professionals.

To provide employers with the confidence that you not only know your stuff, but can do the job, challenge the C|EH (Practical) exam to proof your skills.

Learning Outcome

  • Key issues plaguing the information security world, incident management process, and penetration testing
  • Various types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks
  • Different types of Trojans, Trojan analysis, and Trojan countermeasures
  • Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures
  • Social Engineering techniques, identify theft, and social engineering countermeasures
  • Session hijacking techniques and countermeasures
  • Different types of webserver attacks, attack methodology, and countermeasures
  • Different types of web application attacks, web application hacking methodology, and countermeasures

Who should Attend?

  • Students studying in disciplines such as Information Technologies, Information Systems, Web Security & Technologies, Computer Science, and Cyber Forensics
  • IT Professionals who are or specialise in Information System Security, Computer Forensics, Incidence Response, Security Officers, Auditors, Security professionals, Site and Web Administrators, and any IT professionals who are not trained in IT Security
  • Anyone from the general public who is concerned with network and Internet Security are also welcome to attend the CEH course

Eligibility Criteria

  • IT Professionals
  • Management Systems
  • Information security management
This course is endorsed under Critical Infocomm Technology Resource Programme Plus (CITREP+) Programme.
To find out more about CITREP+ Funding, please refer to Programme Support under CITREP+ page


Information is accurate as of 6 August 2019