Certified Ethical Hacker
- التفاصيل
- المنهاج
- FAQ

Who Should Enroll:
- Aspiring cyber security professionals
- IT professionals seeking to enhance their security skills
- Network administrators
- Security officers and auditors
- Anyone interested in ethical hacking and cyber security
Course Objectives:
By the end of this course, you will be able to:
- Understand the fundamentals of ethical hacking and its role in cyber security.
- Conduct effective penetration testing to identify and mitigate vulnerabilities.
- Use various hacking tools and techniques to perform ethical hacking activities.
- Analyze and secure networks, systems, and applications from cyber threats.
· Prepare for and pass the Certified Ethical Hacker (CEH) certification exam.
Learning Format:
- Interactive Online Lectures: Engaging live sessions with industry experts.
- Hands-on Labs: Practical exercises and real-world hacking scenarios in a controlled environment.
- Study Materials: Comprehensive course notes, e-books, and additional resources.
- Community Access: Join a community of learners and professionals for discussion and support.
Course Modules:
Chapters:
1. Introduction to Ethical Hacking
2. Footprinting and Reconnaissance
3. Scanning Networks
4. Enumeration
5. System Hacking
6. Malware Threats
7. Sniffing
8. Social Engineering
9. Denial-of-Service (DoS) Attacks
10. Session Hijacking
11. Web Application Hacking
12. Wireless Network Hacking
13. Evading IDS, Firewalls, and Honeypots
14. Cloud Security
15. Cryptography
16. Emerging Technologies and Trends
17. The latest in Cyber security
This outline covers all essential areas of ethical hacking. It provides a structured path for students to follow, ensuring a comprehensive understanding of the subject and preparation for the CEH certification exam.
b. Inform the public that credentialed individuals meet or exceed the minimum standards.
c. Reinforce ethical hacking as a unique and self-regulating profession.
b. Information Security Analyst.
c. Security Analyst.
d. Certified Ethical Hacker (CEH)
e. Ethical Hacker.
f. Security Consultant, (Computing / Networking / Information Technology)
g. Information Security Manager.
h. Penetration Tester.
i. Penetration Tester/Ethical Hacker
ii. Vulnerability Assessor
iii. Information Security Analyst
iv. Security/Cybersecurity/Network Analyst
v. Computer Forensics Analyst
vi. Security/Cybersecurity Engineer
vii. Information Security Manager
viii. Security Consultant.