Certified Ethical Hacker (CEH) v13 je najnovšia verzia prestížneho kurzu EC-Council pre etických hackerov, ktorá prináša zásadné inovácie v oblasti kybernetickej bezpečnosti. Kurz teraz zahŕňa rozšírené praktické zručnosti a integruje umelú [...]
  • CEHv13
  • Dĺžka 5 dní
  • 75 ITK bodov
  • 9 termínov
  • Bratislava (2 590 €)

    Brno (67 900 Kč)

    Praha (67 900 Kč)

  • Mierne pokročilý

Certified Ethical Hacker (CEH) v13 je najnovšia verzia prestížneho kurzu EC-Council pre etických hackerov, ktorá prináša zásadné inovácie v oblasti kybernetickej bezpečnosti. Kurz teraz zahŕňa rozšírené praktické zručnosti a integruje umelú inteligenciu (AI) do všetkých piatich fáz etického hackingu, čo účastníkom umožňuje efektívnejší a modernejší prístup k analýze hrozieb a obrane.

»

V cene kurzu sú zahrnuté:

  • oficiálne elektronické študijné materiály
  • prístupy do labov po dobu 6 mesiacov
  • voucher na C|EH exam vrátane možnosti jedného zopakovania skúšky zdarma
  • voucher na C|EH Practical
  • C|EH Engage - viac než 3500 hackerských nástrojov, 519 techník útokov a 220 praktických cvičení Vyskúšate si hackovanie na reálnych cvičeniach a získate ďalšie skúsenosti
  • C|EH Compete - nové výzvy každý mesiac

Záujemcovia o tento kurz by mali mať vedomosti aspoň na úrovni kurzu Network Security – Hacking v praxi (GOC3).

Module 01: Introduction to Ethical Hacking. Learn the fundamentals and key issues in information security, including the basics of ethical hacking, information security controls, relevant laws, and standard procedures.
Module 02: Footprinting and Reconnaissance. Learn how to use the latest techniques and tools
for footprinting and reconnaissance, a critical pre-attack phase of ethical hackingearn.
Module 03: Scanning Networks. Learn different network scanning techniques and countermeasures.
Module 04: Enumeration. Learn various enumeration techniques, including Border
Gateway Protocol (BGP) and Network File Sharing (NFS) exploits and associated countermeasures.
Module 05: Vulnerability Analysis. Learn how to identify security loopholes in a target
organization’s network, communication infrastructure, and end systems. Different types of vulnerability assessment and vulnerability assessment tools are also included.
Module 06: System Hacking. Learn about the various system hacking methodologies used
to discover system and network vulnerabilities, including steganography, steganalysis attacks, and how to cover tracks.
Module 07: Malware Threats. Learn about different types of malware (Trojan, viruses,
worms, etc.), APT and fileless malware, malware analysis procedures, and malware countermeasures tracks.
Module 08: Sniffing. Learn about packet sniffing techniques and their uses for discovering network vulnerabilities, plus countermeasures to defend against sniffing attacks.
Module 09: Social Engineering. Learn social engineering concepts and techniques, including how to identify theft attempts, audit human-level vulnerabilities, and suggest social engineering countermeasures.
Module 10: Denial-of-Service. Learn about different Denial-of-Service (DoS) and Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a target and devise DoS and DDoS countermeasures and protections.
Module 11: Session Hijacking. Learn the various session-hijacking techniques used to discover
network-level session management, authentication, authorization, and cryptographic weaknesses and associated countermeasures.
Module 12: Evading IDS, Firewalls, and Honeypots. Learn about firewalls, intrusion detection systems (IDS),
and honeypot evasion techniques; the tools used to audit a network perimeter for weaknesses; and countermeasures.
Module 13: Hacking Web Servers. Learn about web server attacks, including a comprehensive attack methodology used to audit vulnerabilities in web server infrastructures and countermeasures.
Module 14: Hacking Web Applications. Learn about web application attacks, including a comprehensive web application hacking methodology used to audit vulnerabilities in web applications and countermeasures.
Module 15: SQL Injection. Learn about SQL injection attack techniques, evasion techniques, and SQL injection countermeasures.
Module 16: Hacking Wireless Networks. Learn about different types of encryption, threats, hacking methodologies, hacking tools, security tools, and countermeasures for wireless networks.
Module 17: Hacking Mobile Platforms. Learn mobile platform attack vectors, Android and iOS hacking, mobile device management, mobile security guidelines, and security tools.
Module 18: IoT Hacking. Learn different types of Internet of Things (IoT) and operational technology (OT) attacks, hacking methodologies, hacking tools, and countermeasures.
Module 19: Cloud Computing. Learn different cloud computing concepts, such as container technologies and serverless computing, various cloud computing threats, attacks, hacking methodologies, and cloud security techniques and tools..
Module 20: Cryptography. Learn about encryption algorithms, cryptography tools, Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography attacks, and cryptanalysis tools..

Upozorňujeme, že vzhľadom k náročnosti obsahu a veľkému množstvu praktických ukážok nie je možné na kurze prebrať kompletnú osnovu, časť je určená len pre samoštúdium.

  • proktorovaná skúška, ktorú je možné zložiť v našom testovacom stredisku
  • 125 otázok, správnych môže byť viac odpovedí
  • dĺžka skúšky - 4 hodiny
  • EC-Council nezverejňuje, aká je nevyhnutná úspešnosť pre zloženie skúšky, celosvetovo sa pohybuje medzi 60 % a 80 %
  • 20 otázok založených na reálnych scenároch
  • dĺžka skúšky - 6 hodín
Aktuálna ponuka
Školiace miesto
Jazyk kurzu

Uvedené ceny sú bez DPH.