fbpx

Bienvenue à {TC}²

Certified Ethical Hacker Master

Description

Certified Ethical Hacker Master is the brainchild of Jay Bavisi, CEO of EC-Council. It is the next evolution for the world-renowned Certified Ethical Hacker program, and a logical ‘next step’ for those holding this prestigious certification. CEH is meant to be the foundation for anyone seeking to be an Ethical Hacker. The CEH Practical Exam was developed to give Ethical Hackers the chance to prove their Ethical Hacking skills and abilities. Earning the CEH Master designation is your way of saying, “I learned it, I know it, I proved it.”

To earn the Certified Ethical Hacker Master designation you must successfully demonstrate your knowledge of Ethical Hacking through two distinctly different proving grounds. First, you must attempt and successfully pass the ANSI Accredited Certified Ethical Hacker multiple choice exam. Once you complete this first step, you can move on to the second part of earning the CEH Master designation, the CEH Practical Exam.

5 Days

  • IS security managers, CISOs, CIL to obtain a cross-functional vision of security
  • IT security engineers, network and IS security consultants, security experts and freelancers
  • Computer technicians, support and technical assistance workers (level 1, 2 and 3)
  • System and network administrators (Windows, linux, etc.)
  • Project leaders and managers to be aware of current security threats
  • Individuals certified MICROSOFT MCSA, MCSE, MCITP or CISCO CCNP, CCNA who wish to integrate the security section
  • Developers (whatever the programming language) to improve their knowledge of global security
    as well as any person sensitive to the security of his organization’s information system.
  • Anyone interested, passionate and motivated by IT security and wishing to move towards security (e.g. professional reconversion) can follow this CEH course.
  • Demonstrate the understanding of attack vectors.
  • Perform network scanning to identify live and vulnerable machines in a network.
  • Perform OS banner grabbing, service, and user enumeration.
  • Perform system hacking, steganography, steganalysis attacks, and cover tracks.
  • Identify and use viruses, computer worms, and malware to exploit systems.
  • Perform packet sniffing.
  • Conduct a variety of web server and web application attacks including directory traversal, parameter tampering, XSS, etc.
  • Perform SQL injection attacks.
  • Perform different types of cryptography attacks.
  • Perform vulnerability analysis to identify security loopholes.
  1. Introduction au Ethical Hacking
  2. Footprinting et Reconnaissance
  3. Scanning de réseaux
  4. Enumération
  5. Analyse des vulnérabilités
  6. System Hacking
  7. Analyse de Malwares Chevaux de Troie, Backdoors, Virus, Vers, etc.
  8. Sniffing
  9. Ingénierie sociale
  10. Denial-of-service
  11. Session Hijacking
  12. Evasions d’IDS, Firewalls & Honeypots
  13. Web Server Hacking
  14. Web Application Hacking
  15. Injection SQL
  16. Hacking de réseaux sans fil
  17. Hacking des plateformes Mobiles
  18. IoT Hacking
  19. Cloud Computing
  20. Cryptographie

Prochaines sessions

0/5 (0 Reviews)
0/5 (0 Reviews)
X
X
X