Certified Ethical Hacker (CEH) Training Program
The components of the training program include
• 8 hours a day for 5 days
• Class Hours:
The Certified Ethical Hacker (CEH) certification is a leading international certification requiring the competencies of a Professional Hacker. The objective of the certification is to evaluate a person’s skills as a capable, up-to-date and self-sufficient security tester. Certification involves passing a challenging examination, requiring knowledge of skills acquired by hacking and assessing the vulnerabilities of systems using a wide range of tools and techniques.
|Bootcamp||Aug 7, 2017||Aug 11, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Aug 24, 2017||Aug 28, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Sept 11, 2017||Sept 15, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Sept 25, 2017||Sept 29, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Sept 04, 2017||Oct 04, 2017||Weekdays||6:00PM – 10:00PM||Northern Virginia|
|Bootcamp||Oct 02, 2017||Oct 05, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Oct 16, 2017||Oct 20, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Nov 06, 2017||Nov 10, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Nov 13, 2017||Nov 17, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Nov 27, 2017||Dec 01, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Dec 04, 2017||Dec 08, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
|Bootcamp||Dec 11, 2017||Dec 15, 2017||40 Hours||9:00AM – 5:00PM||Northern Virginia|
Check back often for updates or send us an email at training@TASCManagement.com so we can notify you of upcoming courses.
An Information Technology (IT) professional who has networking and administrative skills in Windows-based TCP/IP networks and familiarity with other operating systems, CompTIA A+ and Network+ certifications, or equivalent knowledge, and 6-9 months experience in networking, including experience configuring and managing TCP/IP. Although not required, students might find it helpful to obtain foundational information from introductory operating system administration courses.
Recommended experience: CompTIA Network+ certification and two years of technical networking experience, with an emphasis on security.
At the completion of this course, students will be able to conduct ethical hacking. They will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it! They will scan, test, hack and secure their own systems. The lab intensive environment gives each student in-depth knowledge and practical experience with the current essential security systems. Students will begin by understanding how perimeter defenses work and then be lead into scanning and attacking their own networks, no real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows, Virus Creation and others.
The CEH Program certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective. The CEH certification significantly benefits security officers, auditors, security professionals, site administrators, and those concerned about the integrity of the network infrastructure. A Certified Ethical Hacker is a skilled professional who knows how to look for the weaknesses and vulnerabilities in a system.
Instructor led, group-paced, classroom-delivery learning model with structured hands-on activities.
• Certification: Certified Ethical Hacker v8
• Number of questions: 150
• Length of test: 4 hours
• Passing score: 70%
• Languages: English
• Exam codes: CEHv7 Exam 312-50
Section 1: Introduction to Ethical Hacking
Section 2: Footprinting and Reconnaissance
Section 3: Scanning Networks
Section 4: Enumeration
Section 5: System Hacking
Section 6: Trojans and Backdoors
Section 7: Viruses and Worms
Section 8: Sniffers
Section 9: Social Engineering
Section 10: Denial of Service
Section 11: Session Hijacking
Section 12: Hacking Webservers
Section 13: Hacking Web Applications
Section 14: SQL Injection
Section 15: Hacking Wireless Networks
Section 16: Evading IDS, Firewalls, and Honeypots
Section 17: Buffer Overflow
Section 18: Cryptography
Section 19: Penetration Testing