The Certified Ethical Hacker (CEH) has been battle-hardened over the last 20 years, creating hundreds of thousands of Certified Ethical Hackers employed by top companies, militaries, and governments worldwide.
CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. This course was built to incorporate a unique, in-depth and interactive hands-on environment and systematic process across each ethical hacking domain and methodology, giving you the opportunity to work towards proving the required knowledge and skills needed to achieve the CEH credential.
In its 12th version, the Certified Ethical Hacker continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. CEH provides comprehensive training, hands-on learning labs, practice cyber ranges for engagement, certification assessments, cyber competitions, and opportunities for continuous learning into one comprehensive program curated through our new learning framework: 1. Learn 2. Certify 3. Engage 4. Compete.
This course comes with the Certified Ethical Hacker (CEH) v12 PRO Bundle:
eCourseware and next version eCourseware
6 Months Official Labs
CEH Exam Voucher
3 x CEH Exam Retakes
Ethical Hacking Video Library
CEH Engage
New Learning Methodology: Learn – Certify – Engage – Compete
Compete: new challenges every month to test your job-ready skills!
100% Compliance to NICE 2.0 Framework
Based on a comprehensive industry-wide job-task analysis
Hands-on learning labs
Practice Range
Global CEH community competitions
Cheat Sheet
Coverage of the latest malware
Lab-intensive program (Every learning objective is demonstrated using labs)
Hands-on program (50%+ of training time is dedicated to labs)
Lab environment simulates a real-time environment (Lab setup simulatesreal-life networks and platforms)
Covers the latest hacking tools (Based on Windows, macOS, and Linux)
Latest OS covered and a patched testing environment
All the tool screenshots are replaced with the latest version
All the tool listing slides are updated with the latest tools
All the countermeasure slides are updated
MITRE ATTACK Framework
Diamond Model of Intrusion Analysis
Techniques for Establishing Persistence
Evading NAC and Endpoint Security
Fog Computing
Edge Computing
Grid Computing
Windows 11
Windows Server 2022
Windows Server 2019
Parrot Security
Android
Ubuntu Linux
3000+ Student Manual Pages
1900+ Lab Manual Pages
3500+ Hacking & Security Tools
220 Hands-On Lab Practicals
519 Attack Techniques
20 Refreshed Modules
Mid-Level Information Security Auditor
Cybersecurity Auditor
Security Administrator
IT Security Administrator
Cyber Defense Analyst
Vulnerability Assessment Analyst
Warning Analyst
Information Security Analyst 1
Security Analyst L1
Infosec Security Administrator
Cybersecurity Analyst level 1, level 2, & level 3
Network Security Engineer
SOC Security Analyst
Security Analyst
Network Engineer
Senior Security Consultant
Information Security Manager
Senior SOC Analyst
Solution Architect
Cybersecurity Consultant
CompTIA Linux+ Certification
Introduction to Ethical Hacking
Foot-printing and Reconnaissance
Scanning Networks
Enumeration
Vulnerability Analysis
System Hacking
Malware Threats
Sniffing
Social Engineering
Denial-of-Service
Session Hijacking
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
SQL Injection
Hacking Wireless Networks
Hacking Mobile Platforms
IoT and OT Hacking
Cloud Computing
Cryptography
EC-Council Certified Ethical Hacker (CEH) v12 PRO
Praha
anglicky
Články společnosti