Certified Ethical Hacker (CEH) v12

By SECC Shop
0
(0)
0 42
£120 £80
-33%
HD1H2219

CEHv12 is the latest iteration of EC-Council’s Certified Ethical Hacker series. In this course you will research, discover and scan targets, analyze vulnerabilities and test attack methods and tools. The focus of this course is to solve the challenge of breaking into a target network, collect evidence of success, and escape unnoticed. Every lesson and topic are infused with step-by-step guided practice using real hardware- and software-based hacking tools. Throughout both lecture and hands-on activities, the instructor provides commentary from the field including tips, tricks and hard-learned lessons.

You will learn to hack Windows and Linux systems, enumerate targets, steal information, hide secret messages in plain sight, and cover their tracks. You will crack passwords, intercept transmissions, use malware to compromise services, social engineer the unsuspecting, and sniff, spoof, escalate, and denial-of-service your way to “pwning” a target*. Along with such venerable tools as nmap and netcat, you will learn how to use the Metasploit Framework and Kali Linux to test a wide array of attacks. You will search Exploit-DB, GitHub and other sites for the latest exploit code, using those hacks when existing tools just won’t do.

 * To pwn: (pronounced “pone”). In hacker vernacular, to “punk” and “own” (completely take over) a system.

 Why you should take this course:

CEHv12 puts you in the driver’s seat of penetration testing. In addition to covering all of the relevant CEH 312-50 exam objectives, you will practice hacking extensively.

Intended audience:

This course is intended for IT professionals including:

Ethical hackers

System Administrators

Network Administrators

Engineers

Web managers

Auditors

Security Professionals

 

Course prerequisites:

While there are no requirements for taking this course, it is highly recommended that you have already completed the Network+ and Security+ courses, or have equivalent knowledge.

You will also need a 64-bit PC that supports VMware Workstation Player virtualization, with a minimum of 8 GB of RAM (16 GB is preferred), 100 GB of free disk space, running Windows 10 Professional or later.

 

Instructor biography:

Chrys Thorsen is a master trainer and network security consultant with 25 years’ experience in building and securing enterprise networks. Her clients have included US government agencies, academic institutions and hospitals, international non-governmental organizations and Fortune 500 companies, as well as small- and medium-sized businesses. During her career she has earned over 40 IT certifications including EC-Council CEH and CEI, CISSP, ISACA CISA, CompTIA PenTest+ and CNVP, Cisco CCSI and CCNP, and Microsoft MCT and MCSE/MCITP. She has authored over 30 IT textbooks and even more full-length video courses including the first CompTIA PenTest+ official courseware, multiple editions of Network+ and CISSP, and Cyber Secure Coding for Android and iOS.  Her students have included every type of IT professional from working sys- and netadmins, to DoD cyber commandos, to help desk staff and career changers. Chrys lives by the professional creed “the only true metric of a successful training is results on the ground. Everything else is just noise.”

No reviews found!

No comments found for this product. Be the first to comment!