Caricamento...
EC001

EC-Council Certified Ethical Hacker (CEHv12)

Prezzo

€ 3,500.00
(Iva esclusa)

Scheda tecnica

Scarica

Giorni

4.5 gg

È disponibile la nuova versione del corso C|EHv12 che offre una esperienza completamente nuova, con materiali e contenuti aggiornati.

Fino al 15 Dicembre 2022, i partecipanti potranno avere il nuovo  Kit Elite C|EH v.12 che comprende: 

  • eCourseware
  • Exam Voucher
  • Next Version eCourseware
  • Exam Retakes Unlimited
  • Ethical Hacking Video Courses
  • 6 Months Official Labs
  • C|EH Engage
  • Global C|EH Challenge
  • Exam Preparation
  • C|EH Practical

Il corso Certified Ethical Hacker (C|EH v12) è un corso riconosciuto a livello internazionale. Dalla sua creazione nel 2003, Il corso Certified Ethical Hacker si è ampiamente diffuso nel mondo, si tratta di una certificazione riconosciuta e accreditata in conformità ANSI 17024, che dà credibilità e valore aggiunto ai membri certificati.

È ora disponibile in versione 12. Il corso è stato aggiornato per fornire agli studenti gli strumenti e le tecniche utilizzate da hackers e professionisti della sicurezza, allo scopo di poter entrare in qualsiasi sistema informativo.

Il programma farà immedesimare i partecipanti “nella mentalità dell’Hacker”, cioè insegnerà a pensare come un Hacker e difendersi meglio.

Gli studenti comprenderanno come scansionare, testare e proteggere un sistema. Il corso copre le 5 fasi dell’Ethical Hacking: “Reconnaissance, Gaining Access, Enumeration, Maintaining Access and Covering your tracks”.

Il corso è organizzato in una parte di aula con il docente e una parte in autoapprendimento. Il docente, all’inizio del corso, fornirà i dettagli delle parti da studiare in autoapprendimento.

  • Information Security Analyst / Administrator
  • Information Assurance (IA) Security Officer
  • Information Security Manager / Specialist
  • Information Systems Security Engineer / Manager
  • Information Security Professionals / Officers
  • Information Security / IT Auditors
  • Risk / Threat / Vulnerability Analyst
  • System Administrators
  • Network Administrators and Engineers

Consigliati:

  • conoscenza del protocollo TCP / IP 
  • conoscenza base del sistema operativo Windows
  • conoscenza base del sistema operativo LINUX

Module 01: Introduction to Ethical Hacking

  • Information Security Overview
  • Hacking Methodologies and Frameworks
  • Hacking Concepts
  • Ethical Hacking Concepts
  • Information Security Controls
  • Information Security Laws and Standards


Module 02: Footprinting and Reconnaissance

  • Footprinting Concepts
  • Footprinting through Search Engines
  • Footprinting through Web Services
  • Footprinting through Social Networking Sites
  • Website Footprinting
  • Email Footprinting
  • Whois Footprinting
  • DNS Footprinting
  • Network Footprinting
  • Footprinting through Social Engineering
  • Footprinting Tools
  • Footprinting Countermeasures


Module 03: Scanning Networks

  • Network Scanning Concepts
  • Scanning Tools
  • Host Discovery
  • Port and Service Discovery
  • OS Discovery (Banner Grabbing/OS Fingerprinting)
  • Scanning Beyond IDS and Firewall
  • Network Scanning Countermeasures


Module 04: Enumeration

  • Enumeration Concepts
  • NetBIOS Enumeration
  • SNMP Enumeration
  • LDAP Enumeration
  • NTP and NFS Enumeration
  • SMTP and DNS Enumeration
  • Other Enumeration Techniques
  • Enumeration Countermeasures


Module 05: Vulnerability Analysis

  • Vulnerability Assessment Concepts
  • Vulnerability Classification and Assessment Types
  • Vulnerability Assessment Tools
  • Vulnerability Assessment Reports


Module 06: System Hacking

  • Gaining Access
  • Escalating Privileges
  • Maintaining Access
  • Clearing Logs


Module 07: Malware Threats

  • Malware Concepts
  • APT Concepts
  • Trojan Concepts
  • Virus and Worm Concepts
  • Fileless Malware Concepts
  • Malware Analysis
  • Malware Countermeasures
  • Anti-Malware Software


Module 08: Sniffing

  • Sniffing Concepts
  • Sniffing Technique: MAC Attacks
  • Sniffing Technique: DHCP Attacks
  • Sniffing Technique: ARP Poisoning
  • Sniffing Technique: Spoofing Attacks
  • Sniffing Technique: DNS Poisoning
  • Sniffing Tools
  • Sniffing Countermeasures


Module 09: Social Engineering

  • Social Engineering Concepts
  • Social Engineering Techniques
  • Insider Threats
  • Impersonation on Social Networking Sites
  • Identity Theft
  • Social Engineering Countermeasures


Module 10: Denial-of-Service

  • DoS/DDoS Concepts
  • Botnets
  • DoS/DDoS Attack Techniques
  • DDoS Case Study
  • DoS/DDoS Attack Countermeasures


Module 11: Session Hijacking

  • Session Hijacking Concepts
  • Application-Level Session Hijacking
  • Network-Level Session Hijacking
  • Session Hijacking Tools
  • Session Hijacking Countermeasures


Module 12: Evading IDS, Firewalls, and Honeypots

  • IDS, IPS, Firewall, and Honeypot Concepts
  • IDS, IPS, Firewall, and Honeypot Solutions
  • Evading IDS
  • Evading Firewalls
  • Evading NAC and Endpoint Security
  • IDS/Firewall Evading Tools
  • Detecting Honeypots
  • IDS/Firewall Evasion Countermeasures


Module 13: Hacking Web Servers

  • Web Server Concepts
  • Web Server Attacks
  • Web Server Attack Methodology
  • Web Server Attack Countermeasures
  • Patch Management


Module 14: Hacking Web Applications

  • Web Application Concepts
  • Web Application Threats
  • Web Application Hacking Methodology
  • Web API, Webhooks, and Web Shell
  • Web Application Security


Module 15: SQL Injection

  • SQL Injection Concepts
  • Types of SQL Injection
  • SQL Injection Methodology
  • SQL Injection Tools
  • Evasion Techniques
  • SQL Injection Countermeasures


Module 16: Hacking Wireless Networks

  • Wireless Concepts
  • Wireless Encryption
  • Wireless Threats
  • Wireless Hacking Methodology
  • Wireless Hacking Tools
  • Bluetooth Hacking
  • Wireless Attack Countermeasures
  • Wireless Security Tools


Module 17: Hacking Mobile Platforms

  • Mobile Platform Attack Vectors
  • Hacking Android OS
  • Hacking iOS
  • Mobile Device Management
  • Mobile Security Guidelines and Tools


Module 18: IoT and OT Hacking

  • IoT Hacking IoT Concepts 
  • IoT Attacks
  • IoT Hacking Methodology
  • IoT Attack Countermeasures
  • OT Hacking OT Concepts
  • OT Attacks
  • OT Hacking Methodology
  • OT Attack Countermeasures


Module 19: Cloud Computing

  • Cloud Computing Concepts
  • Container Technology
  • Serverless Computing
  • Cloud Computing Threats
  • Cloud Hacking
  • Cloud Security


Module 20: Cryptography

  • Cryptography Concepts
  • Encryption Algorithms
  • Cryptography Tools
  • Public Key Infrastructure (PKI)
  • Email Encryption
  • Disk Encryption
  • Cryptanalysis
  • Cryptography Attack Countermeasures

Il corso è propedeutico per i seguenti esami:

  • 312-50 - Certified Ethical Hacker
Sede Data P
Milano Virtual Class 03/10/2022
Milano Virtual Class 21/11/2022