top of page
CEH2.JPG

This is a Paragraph. Click on "Edit Text" or double click on the text box to start editing the content and make sure to add any relevant details or information that you want to share with your visitors.

Course Duration : 5 Days

Course Outline

  • Introduction to Ethical Hacking

  • Foot printing and Reconnaissance

  • Scanning Networks

  • Enumeration

  • Vulnerability Analysis

  • System Hacking

  • Malware Threats

  • Sniffing

  • Social Engineering

  • Denial-of-Service

  • Session Hijacking

  • Evading IDS, Firewalls, and Honeypots

  • Hacking Web Servers

  • Hacking Web Applications

  • SQL Injection

  • Hacking Wireless Networks

  • Hacking Mobile Platforms

  • IoT and OT Hacking

  • Cloud Computing

  • Cryptography

Target Audience
• Information Security Analyst /Administrator
• Information Assurance (IA) Security Officer
• Information Security Manager / Specialist
• Information Systems Security Engineer /Manager
• Information Security Professionals /Officers
• Information Security / IT Auditors
• Risk / Threat/Vulnerability Analyst
• System Administrators
• Network Administrators and Engineers

SG Time Zone
10:00 AM - 6:00 PM

AU/NZ Time Zone :
8:00/10:00 AM - 4:00/6:00 PM

Training Starts @

10:00 AM - Philippines

10:00 AM - Hong Kong

10:00 AM - Brunei

09:00 AM - Cambodia

09:00 AM - Vietnam

08:30 AM - Myanmar

08:00 AM - Bangladesh

07:30 AM - Sri Lanka

To know more about course details, please download brochure.

Please contact us for more details.
*Terms & Conditions apply.
If you find our scheduled dates will not work for you , Please send us an email for your desired training dates.

Course Description
The Certified Ethical Hacker (CEH) credential is the most trusted ethical hacking certification and accomplishment recommended by employers globally. It is the most desired information security certification and represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. Since the introduction of CEH in 2003, it is recognized as a standard within the information security community. CEH v11 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today. The Five Phases of Ethical Hacking and the original core mission of CEH remain valid and relevant today: “To beat a hacker, you need to think like a hacker.”

Schedule

Feb., Mon 21 - Fri 25 | SG Time Zone

Mar., Mon 21 - Fri 25 | AU/NZ Time Zone

Apr., Mon 25 - Fri 29 | SG Time Zone

May., Mon 23 - Fri 27 | AU/NZ Time Zone

Jun., Mon 20 - Fri 24 | SG Time Zone

Brochure

Course Outline

bottom of page