CEH provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act maliciously so you will be better positioned to setup your security infrastructure and defend against future attacks. An understanding of system weaknesses and vulnerabilities helps organizations strengthen their system security controls to minimize the risk of an incident.





CEH Course Benefits

# Incorporating Parrot Security OS

# Re-mapped to NIST/NICE Framework

# Enhanced Cloud Security & IoT and Operational Technology (OT) Modules

# Modern Malware Analysis

# The industry’s Most Comprehensive Tools Library



Prerequisites

# Basic computer knowledge



Course Outline

# Introduction to Ethical Hacking

# Foot-printing and Reconnaissance

# Scanning Networks

# Enumeration

# Vulnerability Analysis

# System Hacking

# Malware Threats

# Sniffing

# Social Engineering

# Denial-of-Service

# Session Hijacking

# Evading IDS, Firewalls, and Honeypots

# Hacking Web Servers

# Hacking Web Applications

# SQL Injection

# Hacking Wireless Networks

# Hacking Mobile Platforms

# IoT Hacking

# Cloud Computing

# Cryptography



Duration

3 Months



Price

# 5,500 Taka for Bangladeshi students

# $100  US Dollars for International Students




Contact us 

Need Technical Assistance? Speak with a support representative by Mailing - hackerslash@icloud.com