This is the worlds most advanced certified ethical hacking course with 20 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization. In 20 comprehensive modules, the course covers 340 attack technologies, commonly used by hackers. About the Program Our security experts have designed over 140 labs which mimic real time scenarios in the course to help you “live” through an attack as if it were real and provide you with access to over 2200 commonly used hacking tools to immerse you into the hacker world. As “a picture tells a thousand words”, our developers have all this and more for you in over 1685 graphically rich, specially designed slides to help you grasp complex security concepts in depth which will be presented to you in a 5 day hands on class by our Certified EC-Council Instructor. The goal of this course is to help you master an ethical hacking methodology that can be used in a penetration testing or ethical hacking situation. You walk out the door with ethical hacking skills that are highly in demand, as well as the internationally recognized Certified Ethical Hacker certification! This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.
-
Learning Objectives
Cybersecurity Expert Program Objectives
- Identify basic network theory concepts and major network communications methods
- Describe bounded network media
- Identify unbounded network media
- Identify the major types of network implementations
- Identify TCP/IP addressing and data delivery methods
- Implement routing technologies
- Identify the major services deployed on TCP/IP networks
- Identify the infrastructure of a WAN implementation
- Identify the components used in cloud computing and virtualization
- Describe basic concepts related to network security
- Prevent security breaches
- Respond to security incidents
- Identify the components of a remote network implementation
- Identify the tools, methods, and techniques used in managing a network
- Describe troubleshooting of issues on a network
- Identify the hardware components of personal computers and mobile digital devices
- Identify the basic components and functions of operating systems
- Identify networking and security fundamentals
- Identify the operational procedures that should be followed by professional PC technicians
- Install, configure, and troubleshoot display devices
- Install and configure peripheral components
- Manage system components
- Manage data storage
- Install and configure Microsoft Windows
- Optimize and maintain Microsoft Windows
- Work with other operating systems
- Identify the hardware and software requirements for client environment configurations
- Identify network technologies
- Install and configure networking capabilities
- Support mobile digital devices
- Support printers and multifunction devices
- Identify security threats, vulnerabilities, and controls
- Implement security controls
- Troubleshoot system-wide issues
-
Training Purpose
-
Delivery Method