Key Information
Target audience: System Administrators, Network Administrators, Security Consultants, Cybersecurity Auditors | Duration: 5 days | 9:00–17:00 | Trainer: Next Akademie GmbH | Online seminar | Number of participants: 6-12
Description
“To beat a hacker, you need to think like a hacker” is the motto of this training. At the end, all participants will take an exam leading to the "CEH Certified Ethical Hacker" certificate from the EC-Council. The seminar will be held in English using a video conference system. The official CEH materials and the CEH exam are in English anyway.
The CEH certificate from the EC-Council is an internationally recognized qualification that identifies graduates as experts in IT and network security. In the online training, which takes place in an interactive live remote environment, all 20 modules of the Certified Ethical Hacker course v12 (CEH) will be thoroughly covered.
Golem Karrierewelt is an Accredited Training Center of the EC-Council.
Services Included
The workshop refers to the CEH v12 Pro version and includes the following:
- Electronic course materials as well as the next version of the electronic course materials (English)
- 6 months access to more than 75 ethical hacking exercises of the official CEHv12 labs (English) of the EC-Council
- Exam voucher for the Certified Ethical Hacker (CEH) exam, includes three exam attempts
- 5 ethical hacking video courses
- CEH Engage
CEH Exam
The exam voucher for the Certified Ethical Hacker (CEH) is included in the course price and allows for three exam attempts. The exam consists of 125 multiple-choice questions from the CEH curriculum and lasts 4 hours. It can be taken either through PearsonVUE or on a home PC. Requirements are a stable internet connection, webcam, microphone, and identification documents.
Agenda
- Introduction to Ethical Hacking
- Footprinting and Reconnaissance
- Scanning Networks
- Enumeration
- Vulnerability Analysis
- System Hacking
- Malware Threats
- Sniffing
- Social Engineering
- Denial-of-Service
- Session Hijacking
- Evading IDS, Firewalls, and Honeypots
- Hacking Web Servers
- Hacking Web Applications
- SQL Injection
- Hacking Wireless Networks
- Hacking Mobile Platforms
- IoT and OT Hacking
- Cloud Computing
- Cryptography
Learning Objectives
- Targeted protection against possible attacks
- Practical exercises and scenarios for detecting and resolving security-relevant vulnerabilities
- Approach of a professional hacker and their tools, tricks, tactics
Examination of target systems for vulnerabilities, misconfigurations, and weaknesses - Social engineering to find the weakest link in an organization
Target Audience and Requirements
The workshop is primarily aimed at system administrators, network administrators, security consultants, and IT professionals seeking further certification in this field with a focus on hacking.
Participation requires solid foundational knowledge and practical experience in Linux, Windows & Windows Server, command line, network, and TCP/IP. Due to the extensive curriculum of the CEH exam, it is recommended to engage with the exam topics beyond the course participation.