Learn how to hack … ethically!
This high quality online course from Global Edulink will teach you how to hack ethically and lawfully.
A Certified Ethical Hacker is a skilled professional who understands and knows how to find weaknesses and vulnerabilities in target systems and uses the same knowledge and tools that a malicious hacker does but in a legitimate manner to assess the security posture of target systems. Our course can provide you with the CEH credential that certifies you in the specific network security discipline of ethical hacking from a vendor-neutral perspective. This knowledge is extremely valuable in the current climate as virtually all aspects of society are now computerised and cyber crime is a real threat, so there is huge demand for computer savvy individuals who understand how hackers operate. Upon completing this course candidates will be highly desirable to employers and will be able to capitalise on the need for cyber security.
The purpose of this course is to:
By gaining a recognised qualification through a leading UK training provider such as Global Edulink, you can make your CV stand out from the crowd and demonstrate your enhanced capabilities to your current or future employer.
Benefits you will gain:
This online training course is comprehensive and designed to cover the key topics listed under the course curriculum section below. This course has been designed for 30 guided learning hours.
Successful candidates will be awarded a certificate in Certified Ethical Hacker (CEH).
Number of Questions: 125
Test Duration: 4 Hours
Test Format: Multiple Choice]
PLEASE NOTE: This is not included official Exam and you need to purchase exam separately.
There are many lucrative careers that this course would be beneficial for, including:
|1. introduction to ethical hacking|
|Introduction to Ethical Hacking||00:14:00|
|2. what is footprinting and reconnaissance?|
|What is Footprinting and Reconnaissance?||01:07:00|
|3. scanning networks in ethical hacking|
|Scanning Networks in Ethical Hacking||00:38:00|
|4. enumeration hacking phase|
|Enumeration Hacking Phase||00:24:00|
|5. system hacking techniques|
|System Hacking Techniques||00:35:00|
|6. difference between trojans and backdoors|
|Difference between Trojans and Backdoors||00:20:00|
|7. definitions of viruses and worms|
|Definitions of Viruses and Worms||00:21:00|
|8. what is denial of service?|
|What is Denial of Service?||00:21:00|
|9. social engineering techniques|
|Social Engineering Techniques||00:32:00|
|10. sniffers in ethical hacking|
|Sniffers in Ethical Hacking||00:43:00|
|11. definition of session hijacking|
|Definition of Session Hijacking||00:42:00|
|12. how to hack webservers?|
|How to Hack Webservers?||00:28:00|
|13. web applications of hacking|
|Web Applications of Hacking||00:30:00|
|14. sql injection technique|
|SQL Injection Technique||00:16:00|
|15. wireless network hacking methodologies|
|Wireless Network Hacking Methodologies||00:32:00|
|16. network evading ids firewalls and honeypots|
|Network Evading IDS Firewalls and Honeypots||00:14:00|
|17. what is buffer overflow?|
|What is Buffer Overflow?||00:30:00|
|18. cryptography methods|
|19. penetration testing methodologies|
|Penetration Testing Methodologies||01:20:00|
|Mock Exam: Certified Ethical Hacker (CEH)||00:40:00|