Kurser

Kursusadministration

Brug for hjælp?

  • Gregersensvej 8
  • 2630 Taastrup
Google MapsApple MapsRejseplanen
  • Forskerparken Fyn, Forskerparken 10F
  • 5230 Odense M
Google MapsApple MapsRejseplanen
  • Teknologiparken Kongsvang Allé 29
  • 8000 Aarhus C
Google MapsApple MapsRejseplanen
  • NordsøcentretPostboks 104
  • 9850Hirtshals
Google MapsApple MapsRejseplanen
  • Gammel Ålbovej 1
  • 6092Sønder Stenderup
Google MapsApple MapsRejseplanen
87218 - Certified Ethical Hacker v9
Nyt
365 dages online kursus

Online kursus: Certified Ethical Hacker (CEH)

For at være to skridt foran en hacker, må du tænke som en - på kurset her lærer du hvordan! Gennem et hands-on miljø vil du blive vist, hvordan man hacker etisk korrekt. Dette kursus er forberedende til EC Council Certified Ethical Hacker exam 312-50. Kurserne er på engelsk og foregår online, når det passer dig. Du har adgang til online kursuspakken i 365 dage.

online kurser

How hacking can help secure your systems

Hacking involves gaining unauthorized access to a computer system. Penetration testing is performed by ethical hackers using the same hacking techniques as an attacker would use, in order to uncover real and potential security vulnerabilities. Instead of taking advantage of these vulnerabilities, the ethical hacker reports them to the organization who can then put in place the appropriate countermeasures to protect themselves against malicious hackers. In this course package, we discuss hacking concepts, methods, and penetration testing. You will be exposed to an entirely different way of achieving optimal information security posture in their organization; by hacking it!

This collection can be used in preparation for the Certified Ethical Hacker 312-50 exam. The course has been developed in partnership with EC-Council and is based on their Ethical Hacking and Countermeasures course materials and labs.

Video

 

Target audience

This course will significantly benefit network and information security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of the network infrastructure. It is recommended that students have a basic knowledge of IT and a technical background.

Benefits

  • You will learn how to conduct ethical hacking
  • You will acquire the skills to scan, test, hack and secure your own systems
  • You will be able to discover “holes” you were not aware of and thereby secure your systems better

Collection content

Hacking and Penetration Testing
  • Identify factors to consider when outsourcing penetration testing
  • Identify effective penetration testing techniques in a given scenario
Footprinting and Reconnaissance
  • Identify social engineering techniques
  • Identify footprinting techniques and tools
Network Scanning
  • Identify the methods performed as part of scanning penetration testing
  • Identify the techniques and tools used in network scanning
Enumeration and Cryptography
  • Match the attack on cryptographic systems to its description
  • Recognize the characteristics of the enumeration phase of an attack and countermeasures to take against enumeration
System Hacking
  • Identify the types of files that can have hidden messages added using Least Significant Bit Insertion
  • Identify the techniques and tools used in system hacking
Malware
  • Identify trojan countermeasures
  • Recognize the definition and characteristics of a virus, a worm and of Sheep dip
Sniffing
  • Match DHCP attacks with their descriptions and countermeasures
  • Identify sniffing attacks and countermeasures
Social Engineering
  • Identify the risks of social engineering through impersonation
  • Identify social engineering techniques and countermeasures
Hacking Web Servers
  • Sequence the steps you would perform to complete a penetration test on your web servers
  • Identify web server hacking techniques and countermeasures against them
Hacking Web Applications
  • Match the web application hacking countermeasure to the type of attack it helps defend against
  • Identify web application hacking techniques and tools and how to counter them
SQL Injection
  • Recognize characteristics of methods of testing for SQL injection vulnerabilities
  • Identify and counter SQL injection techniques and tools
Hacking Wireless Networks
  • Identify types of Bluetooth attacks
  • Identify wireless network hacking techniques and tools and how to counter them
Hacking Mobile Platforms
  • Identify the best practices used to protect all mobile devices from attack
  • Identify methods of mobile device attacks and how to counter them
Evading IDS, Firewalls, and Honeypots
  • Identify firewall penetration testing techniques
  • Identify tools and techniques used to evade IDS, firewalls, and honeypots
Buffer Overflow
  • Recognize countermeasures against buffer overflow attacks
  • Identify buffer overflow attack methodology and tools, and how to counter them

Tidsforbrug

Kursuspakken består af 16 kurser, hvor hvert kursus gennemsnitligt varer halvanden time. Hele kursuspakken kan således gennemføres på ca. 23 timer.

Form

Denne online kursuspakke består af flere forskellige kurser, som du ved tilmelding har adgang til i 365 dage. Hvert enkelt kursus er opdelt i flere kursusmoduler, som du via en oversigtsmenu kan tage i den rækkefølge, du ønsker. Modulerne indeholder lyd, billeder og tekst, der gennemgår kursusindholdet. Nogle moduler indeholder små videofilm med scenarier og cases. Ved hvert kursus har du mulighed for at teste din forståelse af indholdet med tests, som du kan tage både før, under og efter kurset. Du gennemfører kursusmodulerne via din computer eller tablet med lyd og adgang til Internettet. Du kan selv styre, hvornår du vil tage modulerne – og de kan sættes på pause undervejs.

Læs mere om vores online kurser og se svar på dine spørgsmål (FAQ)

Certificering

Dette kursus leder hen mod eksamen 312-50: Certified Ethical Hacker (CEH). Eksamen bestilles og betales særskilt. Kontakt EC Council for flere informationer. Vi henviser til certificeringsudbyderens hjemmeside for nærmere information om aktuelle betingelser for at opnå certificering. I forbindelse med nogle certificeringer skal du selv oprette dig på udbyderens hjemmeside for at få adgang til eksamen. Vær venligst opmærksom på, at der er overensstemmelse mellem den certificeringsversion, du har forberedt dig på og den version, du bestiller eksamen i.

Søgte du et andet online kursus?

Vi tilbyder over 7.000 forskellige online kurser inden for mange forskellige områder. Kontakt os på tlf. 72203000 eller kurser@teknologisk.dk, så vi kan hjælpe med at imødekomme dit behov.

Se desuden listen over vores udvalgte online kurser.

Køb online kurser til flere

Er I en afdeling, en hel virksomhed eller blot flere personer, der ønsker adgang til online kurser, så kontakt os og få et tilbud på tlf. 72203000 eller kurser@teknologisk.dk

Har du faglige spørgsmål så kontakt
Andre kurser