CEH Course Overview

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.

The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.

Ethical hacking is a profession that is becoming popular. With NST’s Ethical Hacker training, candidates will get certified and will be able to hack or enter in the systems of organisations and companies and determine the problems of the security network and find suitable solutions. Become Certified as an Ethical Hacking professional.

Book your course

 

Not sure which course is right for you?

Call us on
020 8840 4496 and we’ll help you try and find the best course for you.

Date

Location

Price

Course Booking


March 20-24, 2017

London-Ealing

£2,995.00 + vat

 

May 08-12, 2017

London-Ealing

£2,995.00 + vat

 

July 17-21, 2017

London-Ealing

£2,995.00 + vat

 

Sep 18-22, 2017

London-Ealing

£2,995.00 + vat

 

Nov 27-Dec 01, 2017

London-Ealing

£2,995.00 + vat

 

                                   We Accept

                                     

 

Email us with the discount code wQ234yt for best price.
 






Course Syllabus

Certified Professional Ethical Hacker  – CEH modules

01 Security Fundamentals

02 Access Controls

03 Protocols

04 Cryptography

05 Why Vulnerability Assessments?

06 Vulnerability Tools of the Trade

07 Output Analysis and Reports

08 Reconnaissance, Enumeration & Scanning

09 Gaining Access

10 Maintaining Access

11 Covering Tracks

12 Malware

13 Buffer Overflows

14 Password Cracking

15 Economics and Law

Appendices 

1  Economics and Law

2  Vulnerability Types

3  Assessing Web Servers

4  Assessing Remote & VPN Services

5  Denial of Services

These course will interest you too!


CRT Boot Camp

CREST Registered Tester


CLFE Boot Camp

Certified Lead Forensics Examiner


WebApp Boot Camp

Web Application Security

Additional Information

Prerequisites

Candidates with verified experience of minimum two years in information security domain are eligible for this training.

Who should attend

This training is intended for professionals concerned with the network infrastructure and preparing for the CEH certification exam.

Courses