• info@mycourse.lk

Certified Ethical Hacker C|EH Powered by AI-Accredited by EC Council v13

14 May 12:27 pm Informatics Institute of Technology

Requirements:

-

Description:

Why Ethical Hacking?


Ethical hackers are the unsung heroes of the digital age. As technology advances, so do cyber threats. Ethical hackers are the first line of defense, uncovering vulnerabilities, fortifying digital fortresses, and ensuring the integrity of systems.


Certified Ethical Hacker (CEH) will provide you with the latest commercial-grade hacking tools, techniques, methodologies, and skills required to become an ethical hacker and information security professional. The goal of this course is to help the candidates.


Enroll Today and Begin Your Journey as an Ethical Hacker!


Are you ready to turn your curiosity into a superpower? Enroll now and let’s embark on a journey where you not only learn the art of ethical hacking but also contribute to creating a safer, more resilient digital world.


Course Details


The escalating threat of new malware, spyware, ransomware, trojans, and worms underscores the critical need for ethical hackers to secure the networks and systems of businesses and government agencies. The professional development units EC Council Certified Ethical Hacker Course will train you on the advanced practices that hackers use, so you can better protect any network and systems from data breaches and threats. This certified ethical hacking course will help you master the advanced network packet analysis, reverse engineering, and system penetration testing techniques to build your network security skill-set.


Course Outline


Module 01: Introduction to Ethical Hacking

Module 02: Footprinting and Reconnaissance

Module 03: Scanning Networks

Module 04: Enumeration

Module 05: Vulnerability Analysis

Module 06: System Hacking

Module 07: Malware Threats

Module 08: Sniffing

Module 09: Social Engineering

Module 10: Denial-of-Service

Module 11: Session Hijacking

Module 12: Evading IDS, Firewalls, and Honeypots

Module 13: Hacking Web Servers

Module 14: Hacking Web Applications

Module 15: SQL Injection

Module 16: Hacking Wireless Networks

Module 17: Hacking Mobile Platforms

Module 18: IoT Hacking

Module 19: Cloud Computing

Module 20: Cryptography


Learning Outcomes


Master the ethical hacking methodology that can be used in a penetration testing or ethical hacking situation.


To Whom?


Information Security Analyst/Administrator

Information Assurance Security Officer

Information Security Manager/Specialist

Information Systems Security Engineer/Manager

Information Security Professionals/Officers

Information Security/IT Auditors

Risk/Threat/Vulnerability Analyst

System Administrators

Network Administrators and Engineers

Undergraduates


Method Of Delivery


On-campus group classes


This solution offers in-person CEH training so that an individual can get the benefit of collaborating with industry peers and gaining real-world skills, at our training center located in Colombo


How to Apply?


For further details, please contact


IIT Professional Development Unit


0770 566 577 | pdu@iit.ac.lk



Address : 57, Ramakrishna Road, Colombo 06, Sri Lanka.

Phone : 766760760

Email : info@iit.ac.lk

Website : https://www.iit.ac.lk

Available:

Informatics Institute of Technology