Ваша корзина пуста
Сумма: 0 руб.

Этичный хакинг

О курсе
Этичный хакинг
от 60 000 руб.
Заказать курс

Этичный хакинг

Цель курса – дать слушателям знания и навыки для формирования системного подхода к обеспечению компьютерной безопасности, научить методам проверки безопасности различных узлов компьютерной сети и познакомить слушателей с инструментарием злоумышленников, с их преимуществами и ограничениями.
Расписание и цены
Этот курс набирает желающих участников. Отправьте заявку на участие, а когда наберётся достаточное количество, мы с вами свяжемся.
Заказать обучение
Программа курса

Вы получите знания и навыки, необходимые для успешного выявления и устранения проблем безопасности в смешанных компьютерных сетях. Курс посвящен уникальным хакерским техникам и методам взлома в контексте применения оборонительных практик и рекомендаций, изложенных настоящими хакерами. Курс одобрен министерством обороны США и является официальной библией для сотрудников службы безопасности.

В курсе представлены подробные материалы по работе компьютерных систем и сетей. Рассмотрены типичные уязвимости сетевых протоколов, операционных систем и приложений. Описаны последовательности различных видов атак на компьютерные системы и сети, и предложены рекомендации по укреплению защищенности компьютерных систем и сетей.

Course Description

CEHv8 is a comprehensive Ethical Hacking and Information Systems Security Auditing program focusing on latest security threats, advanced attack vectors, and practical real time demonstration of the latest Hacking Techniques, methodologies, tools, tricks, and security measures. Unlike other strictly theoretical training, you will be immersed in interactive sessions with hands-on labs after each topic. You can explore your newly gained knowledge right away in your classroom by pentesting, hacking and securing your own systems. The lab intensive environment gives you in-depth knowledge and practical experience with the current, essential security systems. You will first begin with understanding how perimeter defenses work and then move into scanning and attacking networks, of course, no real network is harmed. You will also learn how intruders escalate privileges and what steps can be taken to secure a system. You will also gain knowledge about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, and Virus Creation. When you leave this intensive 5 day class you will have hands on understanding and experience in Ethical Hacking. This course prepares you for EC-Council Certified Ethical Hacker exam 312-50.

Target Audience

This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.

Duration

5 days

Certification

The Certified Ethical Hacker exam 312-50 may be taken on the last day of the training (optional). Students need to pass the online Prometric exam to receive CEH certification.

Key Features of CEHv8

  • Updated Content: CEHv8 contains updated information including concepts, methodologies, and tools.
  • It’s not what you know. It’s what you can do. Lab manuals in CEHv8 provide step-by-step walk-throughs of highly technical concepts and are designed to enforce the classroom learning
  • A result oriented, descriptive, and analytical lab manual - the labs showcased in the courseware are tested against the latest Operating Systems (including all patches and hot fixes applied)      
  • Access to CEHv8 course at ASPEN, 24x7 from any geographical location with Internet access      
  • CEHv8 includes more realistic hack websites to practice the learning and labs that are presented as a part of large case studies
  • Well organized DVD-ROM content - a repository of approximately 24GBs of the latest hacking   and security tools      
  • Focus on the attacks targeted to mobile platform and tablet computers and covers   countermeasures to secure mobile infrastructure      
  • CEHv8 courseware is enriched with stunning graphics and animations to demonstrate various hacking concepts and techniques      
  • Concepts are presented in an easy-to-understand manner with diagrammatic representation of various hacking concepts for a better understanding and learning experience      
  • CEHv8 is optimized for multi-platform delivery including pads, smartphones, and touch screens

Version Comparison

CEHv8 provides a comprehensive ethical hacking and network security-training program to meet the standards of highly skilled security professionals. Hundreds of SMEs and authors have contributed to the content presented in the CEHv8 courseware. CEHv8 focuses on the latest hacking attacks targeted to mobile platforms and tablet computers and covers countermeasures to secure mobile infrastructure. It has simplified advanced technical content with an emphasis on vulnerability assessment, risk assessment, penetration testing, and system protection.

The new version maps to several government and industry standards for infosec education and training including NICE, DoD 8570, etc. The new exam meets the rigorous requirements of the ANSI ISO/IEC 17024 standard.

The comprehensive instructor slides and student manual in CEHv8 empower the instructors and students with flawless flow and outstanding diagrammatic representation of investigation techniques, which makes it easier to teach and enables students to understand the concepts. Latest tools and exploits uncovered from the underground community are featured in the new package.

Course Outline Version 8

CEHv8 consists of 20 core modules designed to facilitate a comprehensive ethical hacking and penetration testing training.

  • Introduction to Ethical Hacking    
  • Footprinting and Reconnaissance    
  • Scanning Networks    
  • Enumeration    
  • System Hacking   
  • Trojans and Backdoors    
  • Viruses and Worms    
  • Sniffing    
  • Social Engineering    
  • Denial of Service    
  • Session Hijacking    
  • Hacking Webservers    
  • Hacking Web Applications    
  • SQL Injection    
  • Hacking Wireless Networks    
  • Hacking Mobile Platforms    
  • Evading IDS, Firewalls and Honeypots   
  • Buffer Overflows    
  • Cryptography    
  • Penetration Testing