Duration : 45 Days
We are the authorized partner to provide the training and Exam of EC-Council & have dedicated LAB for the course that help students do unlimited practice and empower their skill. We are glad to inform our all trainers are EC-Council approved trainer to conduct their international certification trainings along with having good industry experience who has provided security solution to well known, which guide as per the field requirements and enhance your knowledge.
The courses fees have covered CEH official course ware, online portal access code, voucher for international exams of CEH and training fees of students
Understanding Information Security, Securing the Physical Environment, Examining Operational Security, Working with Management and Policies, Understanding the Goals of Information Security, Comprehending the Security Process, Appreciating Antivirus Software, Implementing Access Control, Understanding Authentication, Authentication Issues to Consider, Distinguishing between Security Topologies, Setting Design Goals, Creating Security Zones, Working with Newer Technologies, Identifying Potential Risks, Calculating Attack Strategies, Understanding Access Attack Types, Recognizing Modification and Repudiation Attacks, Identifying Denial-of-Service and Distributed Denial-of-Service Attacks, Recognizing Common Attacks, Back Door Attacks, Spoofing Attacks,Man-in-the-Middle Attacks, Replay Attacks, Password-Guessing Attacks, Privilege Escalation, Identifying TCP/IP Security Concerns, Working with the TCP/IP Suite, Understanding Encapsulation, Working with Protocols and Services, Recognizing TCP/IP Attacks, Understanding Software Exploitation, Surviving Malicious Code, Viruses, Trojan Horses, Logic Bombs, Worms, Antivirus , Software, Understanding Social Engineering, Introducing Auditing Processes and Files.
Overview of Wireless Security,Authentication Using PSK, Authentication using 802.1x, WEP, AES, WPA, WAP-II, 802.11i, EAP, LEAP, EAP-fast, PEAP, Monitoring Security using WC
An Overview of Cryptography, Understanding Physical Cryptography, Understanding Mathematical Cryptography, Working with Passwords, Understanding Cryptographic Algorithms, The Science of Hashing, Working with Symmetric Algorithms, Working with Asymmetric Algorithms, Using Cryptographic Systems, Confidentiality, Integrity, Digital Signatures, Authentication, Access Control, Using Public Key Infrastructure, Using a Certificate Authority, Working with Registration Authorities and Local Registration Authorities, Implementing Certificates, Understanding Certificate Revocation, Implementing Trust Models, Preparing for Cryptographic Attacks, Understanding Cryptography Standards and Protocols, The Origins of Encryption Standards, Public-Key Infrastructure X.509/Public-Key, Cryptography Standards, X.509, SSL and TLS, Secure Shell, HTTP Secure, IP Security, Tunneling Protocols
Excessive Privilege Abuse, Legitimate Privilege Abuse, Privilege Elevation, Database Platform Vulnerabilities, SQL Injection, Weak Audit Trail, Denial of Service , Database Communication Protocol Vulnerabilities, Weak Authentication, Backup Data Exposure
Overview of Network Security Threats, Defining Security Baselines, Hardening the OS and NOS, Configuring Network Protocols, Hardening Microsoft Windows Vista, Hardening Microsoft Windows XP, Hardening Windows Server 2003, Hardening Microsoft Windows 2000, Updating Your Operating System, Hardening Network Devices, Updating Network Devices, Configuring Routers and Firewalls, Hardening Applications, Hardening Web Servers, Hardening E-Mail Servers, Hardening FTP Servers, Hardening DNS Servers, rdening NNTP Servers, Hardening File and Print Servers and Services, Hardening DHCP Services,