SR (2 590 €)
ČR (67 900 Kč)
Certified Ethical Hacker (CEH) v13 je najnovšia verzia prestížneho kurzu EC-Council pre etických hackerov, ktorá prináša zásadné inovácie v oblasti kybernetickej bezpečnosti. Kurz teraz zahŕňa rozšírené praktické zručnosti a integruje umelú inteligenciu (AI) do všetkých piatich fáz etického hackingu, čo účastníkom umožňuje efektívnejší a modernejší prístup k analýze hrozieb a obrane.
V cene kurzu sú zahrnuté:
V cene kurzu sú zahrnuté:
Záujemcovia o tento kurz by mali mať vedomosti aspoň na úrovni kurzu Network Security – Hacking v praxi (GOC3).
Module 01: Introduction to Ethical Hacking. Learn the
fundamentals and key issues in information security, including the basics of
ethical hacking, information security controls, relevant laws, and standard
procedures.
Module 02: Footprinting and Reconnaissance.
Learn how to use the latest techniques and tools
for footprinting and
reconnaissance, a critical pre-attack phase of ethical
hackingearn.
Module 03: Scanning
Networks. Learn different network scanning techniques and
countermeasures.
Module 04: Enumeration.
Learn various enumeration techniques, including Border
Gateway
Protocol (BGP) and Network File Sharing (NFS) exploits and associated
countermeasures.
Module 05: Vulnerability Analysis.
Learn how to identify security loopholes in a target
organization’s
network, communication infrastructure, and end systems. Different types of
vulnerability assessment and vulnerability assessment tools are also
included.
Module 06: System Hacking. Learn
about the various system hacking methodologies used
to discover system and
network vulnerabilities, including steganography, steganalysis attacks, and how
to cover tracks.
Module 07: Malware Threats. Learn
about different types of malware (Trojan, viruses,
worms, etc.), APT and
fileless malware, malware analysis procedures, and malware countermeasures
tracks.
Module 08: Sniffing. Learn about packet
sniffing techniques and their uses for discovering network vulnerabilities,
plus countermeasures to defend against sniffing attacks.
Module 09:
Social Engineering. Learn social engineering concepts and techniques,
including how to identify theft attempts, audit human-level vulnerabilities, and
suggest social engineering countermeasures.
Module 10:
Denial-of-Service. Learn about different Denial-of-Service (DoS) and
Distributed DoS (DDoS) attack techniques, as well as the tools used to audit a
target and devise DoS and DDoS countermeasures and
protections.
Module 11: Session Hijacking. Learn the
various session-hijacking techniques used to discover
network-level session
management, authentication, authorization, and cryptographic weaknesses and
associated countermeasures.
Module 12: Evading IDS, Firewalls, and
Honeypots. Learn about firewalls, intrusion detection systems
(IDS),
and honeypot evasion techniques; the tools used to audit a network
perimeter for weaknesses; and countermeasures.
Module 13: Hacking Web
Servers. Learn about web server attacks, including a comprehensive
attack methodology used to audit vulnerabilities in web server infrastructures
and countermeasures.
Module 14: Hacking Web Applications.
Learn about web application attacks, including a comprehensive web application
hacking methodology used to audit vulnerabilities in web applications and
countermeasures.
Module 15: SQL Injection. Learn about SQL
injection attack techniques, evasion techniques, and SQL injection
countermeasures.
Module 16: Hacking Wireless Networks. Learn
about different types of encryption, threats, hacking methodologies, hacking
tools, security tools, and countermeasures for wireless
networks.
Module 17: Hacking Mobile Platforms. Learn mobile
platform attack vectors, Android and iOS hacking, mobile device management,
mobile security guidelines, and security tools.
Module 18: IoT
Hacking. Learn different types of Internet of Things (IoT) and
operational technology (OT) attacks, hacking methodologies, hacking tools, and
countermeasures.
Module 19: Cloud Computing. Learn different
cloud computing concepts, such as container technologies and serverless
computing, various cloud computing threats, attacks, hacking methodologies, and
cloud security techniques and tools..
Module 20:
Cryptography. Learn about encryption algorithms, cryptography tools,
Public Key Infrastructure (PKI), email encryption, disk encryption, cryptography
attacks, and cryptanalysis tools..
Upozorňujeme, že vzhľadom k náročnosti obsahu a veľkému množstvu praktických ukážok nie je možné na kurze prebrať kompletnú osnovu, časť je určená len pre samoštúdium.
Uvedené ceny sú bez DPH.
Nenašli ste vhodný termín, alebo chcete školenie prispôsobiť špecifickým potrebám vášho tímu? Radi pre vás pripravíme školenie na mieru.