CINXE.COM
Certified Ethical Hacker - CEH v12
About
Certified Ethical Hacker - CEH v12 is a seminar dedicated to teaching you to think like a hacker, so that you can beat a hacker!. Certified Ethical Hacker - CEH v12 covers topics such as: Various types of footprinting, footprinting tools, and countermeasures, Information security controls, laws, and standards, Enumeration techniques and enumeration countermeasures, Network scanning techniques and scanning countermeasures, System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities, Vulnerability analysis to identify security loopholes in the target organization`s network, communication infrastructure, and end systems, Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing, Different types of malware (Trojan viruses, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures, DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures, Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures, Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures, Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures, SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures, Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures, Mobile platform attack vector, Android vulnerability exploitations, and mobile security guidelines and tools, Wireless encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools, Cloud computing concepts (container technology, serverless computing), the working of various threats and attacks, and security techniques and tools, Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures, Threats to IoT and OT platforms and defending IoT and OT devices, Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap, Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
Profile Details
Certified Ethical Hacker - CEH v12 is a seminar dedicated to teaching you to think like a hacker, so that you can beat a hacker!.
Certified Ethical Hacker - CEH v12 covers topics such as:
- Various types of footprinting, footprinting tools, and countermeasures
- Information security controls, laws, and standards
- Enumeration techniques and enumeration countermeasures
- Network scanning techniques and scanning countermeasures
- System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
- Vulnerability analysis to identify security loopholes in the target organization`s network, communication infrastructure, and end systems
- Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing
- Different types of malware (Trojan viruses, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures
- DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures
- Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures
- Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures
- Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures
- SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
- Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures
- Mobile platform attack vector, Android vulnerability exploitations, and mobile security guidelines and tools
- Wireless encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
- Cloud computing concepts (container technology, serverless computing), the working of various threats and attacks, and security techniques and tools
- Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures
- Threats to IoT and OT platforms and defending IoT and OT devices
- Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
- Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools
Certified Ethical Hacker - CEH v12 might be held in Amsterdam, Netherlands in 2025.
Certified Ethical Hacker - CEH v12 - 17-21 Jun 2024, Amsterdam, Netherlands
Certified Ethical Hacker - CEH v12 - 13-17 May 2024, Amsterdam, Netherlands
Certified Ethical Hacker - CEH v12 - 08-12 Apr 2024, Amsterdam, Netherlands
Certified Ethical Hacker - CEH v12 - 04-08 Mar 2024, Amsterdam, Netherlands
Certified Ethical Hacker - CEH v12 - 13-17 Nov 2023, Amsterdam, Netherlands
Certified Ethical Hacker - CEH v12 - 02-06 Oct 2023, Amsterdam, Netherlands
Business Seminars can Change your Outlook
Understanding the effectiveness of technology conferences
Understanding the usefulness of Technology conferences
Technology conferences - a useful tool
Business conference and trade shows as an efficient tool