This program is the core of the most desired information security training system . The CEH, is the first part of a 3 part EC-Council Information Security Tracks which helps you master hacking technologies. You will become a hacker, but an ethical one!
This course is meant for security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.
ABOUT THE COURSE
- Working Methodology
- Navigating GUI
- Discovering Targets
- Importing scan Data
- An overview of exploits Modules
- Basic exploitation techniques
- Password Brute force exploitation technique
- Pass-The-Hash exploitation technique
- Pivot Attack
- An overview of Payload Module
- Meterpreter Payloads
- Post exploitation technique
- Maintaining Access and privilege escalation
- Web application testing
- Social engineering campaign
WHAT PEOPLE SAY
we deliver more than what you can think of 'In Cyber Security'