Select course by Certification/Exam Body or by Topic Below
CEH Course Overview
The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack.
The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security posture, help implement controls to better secure your company’s network infrastructure and how to combat against hackers and/or viruses, etc.
Ethical hacking is a profession that is becoming popular. With NST’s Ethical Hacker training, candidates will get certified and will be able to hack or enter in the systems of organisations and companies and determine the problems of the security network and find suitable solutions. Become Certified as an Ethical Hacking professional.
Classroom based small, highly interactive sessions.
Widest range of Cyber courses – Select on your exact needs.
The best content developed by qualified professionals.
Great value – Exceptional quality at a great price.
British Computer Society
Book Your Course
Not sure which course is right for you?
Call us on 020 8840 4496 and we’ll help you try and find the best course for you.
Email us for best price!
Certified Professional Ethical Hacker – CEH modules
- Security Fundamentals
- Access Controls
- Why Vulnerability Assessments?
- Vulnerability Tools of the Trade
- Output Analysis and Reports
- Reconnaissance, Enumeration & Scanning
- Gaining Access
- Maintaining Access
- Covering Tracks
- Buffer Overflows
- Password Cracking
- Economics and Law
- Economics and Law
- Vulnerability Types
- Assessing Web Servers
- Assessing Remote & VPN Services
- Denial of Services
These course will interest you too!
Candidates with verified experience of minimum two years in information security domain are eligible for this training.
Who should attend
This training is intended for professionals concerned with the network infrastructure and preparing for the CEH certification exam.