Bratislava (2 590 €)
Brno (67 900 Kč)
Praha (67 900 Kč)
Certified Ethical Hacker (CEH) v13 je najnovšia verzia prestížneho kurzu EC-Council pre etických hackerov, ktorá prináša zásadné inovácie v oblasti kybernetickej bezpečnosti. Kurz teraz zahŕňa rozšírené praktické zručnosti a integruje umelú inteligenciu (AI) do všetkých piatich fáz etického hackingu, čo účastníkom umožňuje efektívnejší a modernejší prístup k analýze hrozieb a obrane.
V cene kurzu sú zahrnuté:
Záujemcovia o tento kurz by mali mať vedomosti aspoň na úrovni kurzu Network Security – Hacking v praxi (GOC3).
Module 01: Introduction to Ethical Hacking. Learn the
fundamentals and key issues in information security, including the basics of
ethical hacking, information security controls, relevant laws, and standard
procedures.
Module 02: Footprinting and Reconnaissance.
Learn how to use the latest techniques and tools
for footprinting and
reconnaissance, a critical pre-attack phase of ethical
hackingearn.
Module 03: Scanning
Networks. Learn different network scanning techniques and
countermeasures.
Module 04: Enumeration.
Learn various enumeration techniques, including Border
Gateway
Protocol (BGP) and Network File Sharing (NFS) exploits and associated
countermeasures.
Module 05: Vulnerability Analysis.
Learn how to identify security loopholes in a target
organization’s
network, communication infrastructure, and end systems. Different types of
vulnerability assessment and vulnerability assessment tools are also
included.
Module 06: System Hacking. Learn
about the various system hacking methodologies used
to discover system and
network vulnerabilities, including steganography, steganalysis attacks, and how
to cover tracks.
Module 07: Malware Threats. Learn
about different types of malware (Trojan, viruses,
worms, etc.), APT and
fileless malware, malware analysis procedures, and malware countermeasures
tracks.
Module 08: Sniffing. Learn about packet
sniffing techniques and their uses for discovering network vulnerabilities,
plus countermeasures to defend against sniffing attacks.
Module 09:
Social Engineering. Learn social engineering concepts and techniques,
including how to identify theft attempts, audit human-level vulnerabilities, and
suggest social engineering countermeasures.
Module 10:
Denial-of-Service. Learn about different Denial-of-Service (DoS) and
Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a
target and devise DoS and DDoS countermeasures and
protections.
Module 11: Session Hijacking. Learn the
various session-hijacking techniques used to discover
network-level session
management, authentication, authorization, and cryptographic weaknesses and
associated countermeasures.
Module 12: Evading IDS, Firewalls, and
Honeypots. Learn about firewalls, intrusion detection systems
(IDS),
and honeypot evasion techniques; the tools used to audit a network
perimeter for weaknesses; and countermeasures.
Module 13: Hacking Web
Servers. Learn about web server attacks, including a comprehensive
attack methodology used to audit vulnerabilities in web server infrastructures
and countermeasures.
Module 14: Hacking Web Applications.
Learn about web application attacks, including a comprehensive web application
hacking methodology used to audit vulnerabilities in web applications and
countermeasures.
Module 15: SQL Injection. Learn about SQL
injection attack techniques, evasion techniques, and SQL injection
countermeasures.
Module 16: Hacking Wireless Networks. Learn
about different types of encryption, threats, hacking methodologies, hacking
tools, security tools, and countermeasures for wireless
networks.
Module 17: Hacking Mobile Platforms. Learn mobile
platform attack vectors, Android and iOS hacking, mobile device management,
mobile security guidelines, and security tools.
Module 18: IoT
Hacking. Learn different types of Internet of Things (IoT) and
operational technology (OT) attacks, hacking methodologies, hacking tools, and
countermeasures.
Module 19: Cloud Computing. Learn different
cloud computing concepts, such as container technologies and serverless
computing, various cloud computing threats, attacks, hacking methodologies, and
cloud security techniques and tools..
Module 20:
Cryptography. Learn about encryption algorithms, cryptography tools,
Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography
attacks, and cryptanalysis tools..
Upozorňujeme, že vzhľadom k náročnosti obsahu a veľkému množstvu praktických ukážok nie je možné na kurze prebrať kompletnú osnovu, časť je určená len pre samoštúdium.
Uvedené ceny sú bez DPH.