c eh c er tif ic atio n - ftms international

2
Duration: 5 Days Method: Online / Classroom CEH CERTIFICATION EC-COUNCIL | C E R T I F I E D E T H I C A L H A C K E R Course Overall What is Ethical Hacking? Trojans viruses and worms SQL injection Direct-Denial-of-Service (DDoS) attacks Learn how to hack and achieve your CEH Certification in just five days on this accelerated Certified Ethical Hacker course. You’ll study the tools and techniques used by cyber criminals to hack organisations and discover how to protect businesses from these attack vectors. You’ll learn the lastest commercial-grade hacking tools, techniques and methodologies used by hackers and information security professionals to lawfully hack an organisation. With this knowledge, you’ll be able to protect businesses from a wide range of threats, including: Ethical hackers (also known as penetration testers) are employed to conduct penetration tests – controlled hacks – on businesses to test systems and find vulnerabilities. Unlike ‘black hat’ hackers, ethical hackers are security professionals able to provide the knowledge and skills needed to fix flaws before they can be exploited. Businesses that hire ethical hackers get specialist insights from the perspective of an intruder. With this knowledge, businesses can fix vulnerabilities and boost their cyber defences. WHO SHOULD DO THIS COURSE? Analysts/Administrators Managers/Specialists Professionals/Officers IT Auditors Systems Security Engineers/Managers Assurance (IA) Security Officer Risk/Threat/Vulnerability Analyst Network Administrator or Engineer This course is ideal for information security: Also for current Information: Additionally, if you are a: *At the end of this accelerated course, you’ll sit the Certified Ethical Hacker (ANSI) exam and achieve your certification. As an EC-Council Accredited Training Partner you'll get access to official courseware and exams.

Upload: others

Post on 12-Nov-2021

1 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: C EH C ER TIF IC ATIO N - FTMS International

Duration: 5 Days Method: Online / Classroom

CEH CERTIFICATIONEC-COUNCIL | C E R T I F I E D E T H I C A L H A C K E R

Course Overall

What is Ethical Hacking?

Trojans viruses and wormsSQL injectionDirect-Denial-of-Service (DDoS) attacks

Learn how to hack and achieve your CEH Certification in justfive days on this accelerated Certified Ethical Hacker course.You’ll study the tools and techniques used by cyber criminalsto hack organisations and discover how to protect businessesfrom these attack vectors.

You’ll learn the lastest commercial-grade hacking tools,techniques and methodologies used by hackers andinformation security professionals to lawfully hack anorganisation. With this knowledge, you’ll be able to protectbusinesses from a wide range of threats, including:

Ethical hackers (also known as penetration testers) areemployed to conduct penetration tests – controlled hacks –on businesses to test systems and find vulnerabilities.

Unlike ‘black hat’ hackers, ethical hackers are securityprofessionals able to provide the knowledge and skillsneeded to fix flaws before they can be exploited. Businessesthat hire ethical hackers get specialist insights from theperspective of an intruder. With this knowledge, businessescan fix vulnerabilities and boost their cyber defences.

WHO SHOULDDO THIS COURSE?

Analysts/AdministratorsManagers/SpecialistsProfessionals/OfficersIT Auditors

Systems SecurityEngineers/ManagersAssurance (IA) Security Officer

Risk/Threat/VulnerabilityAnalystNetwork Administrator orEngineer

This course is ideal for informationsecurity:

Also for current Information:

Additionally, if you are a:

*At the end of this accelerated course,you’ll sit the Certified Ethical Hacker(ANSI) exam and achieve yourcertification. As an EC-CouncilAccredited Training Partner you'll getaccess to official courseware andexams.

Page 2: C EH C ER TIF IC ATIO N - FTMS International

COURSE CURRICULUMModule 01: Introduction to Ethical HackingModule 02: Footprinting and ReconnaissanceModule 03: Scanning NetworksModule 04: EnumerationModule 05: Vulnerability AnalysisModule 06: System HackingModule 07: Malware ThreatsModule 08: SniffingModule 09: Social EngineeringModule 10: Denial-of-Service

Module 11: Session HijackingModule 12: Evading IDS, Firewalls, and HoneypotsModule 13: Hacking Web ServersModule 14: Hacking Web ApplicationsModule 15: SQL InjectionModule 16: Hacking Wireless NetworksModule 17: Hacking Mobile PlatformsModule 18: IoT and OT HackingModule 19: Cloud ComputingModule 20: Cryptography

Ethical Hacking Job Prospectswith CEH Certification

CEH Certification Requirement

Specialist security knowledge provided by ethical hackers ishighly valued by organisations because of the risks of fallingvictim to cyber crime. Cyber security is at the top of theagenda for most world-wide businesses, resulting in amassive demand for IT security professionals like ethicalhackers.

EC-Council recommend you hold two years’ IT workexperience and possess a basic familiarity with Linux or Unix.FTMS also recommend you possess a strong workingknowledge of TCP/IP and Windows Server.

If you attend FTMS’s course, or any other official trainingprogramme, you will not be required to go through EC-Council’s application process. However, if you wish toattempt the exam without training, you must first beapproved through the eligibility application process.

www.ftmsinternational.com

ftms.hk

FTMS Training Systems (Hong Kong) Limited

FTMS Hong Kong