New York Professional Events List


Certified Ethical Hacker - CEH v12


Date
Jan 08, 2024 - 09:00 AM - Jan 12, 06:00 AM
Organizer
IMF Academy
Venue
IMF Academy
Location
Fellenoord 224,

Eindhoven,
The Netherlands,
The Netherlands,
ZIP: 0000
Phone: +31 (0)40 246 02 20

Ticket Price: €3995

Why become a Certified Ethical Hacker (CEH)?

Certified Ethical Hacker - IMF AcademyA (certified) ethical hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A certified ethical hacker understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, certified ethical hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. To beat a hacker, you need to think like a hacker!

Why is CEH in demand globally?

Certified Ethical Hacker (CEH) is the most trusted and desired information security certification and is recommended by employers globally. CEH represents one of the fastest-growing cyber credentials required by critical infrastructure and essential service providers. CEH v12 continues to introduce the latest hacking techniques and the most advanced hacking tools and exploits used by hackers and information security professionals today.

What is new in CEH version 12?

CEH v12 covers more than 500 new threats and vulnerability scenarios. These include but are not limited to APT, fileless malware, web API threats, webhooks, web shell, OT attacks, cloud attacks, AI, ML and much more. CEH v12 now includes the latest malware analysis tactics for ransomware, banking and financial malware, IoT botnets, OT malware analysis, Android malware, and more.

About the CEH exam

The Certified Ethical Hacker (CEH) exam is a 4-hour exam with 125 multiple choice questions. This knowledge-based exam will test your skills in information security threats and attack vectors, attack detection, attack prevention, procedures, methodologies and more.

P.S.  Should you not pass the CEH exam the first time, you may reattend the CEH training for free (within a period of 1 year). We also pay 50% of your exam fee!

Who should be CEH trained and certified?

This official EC-Council accredited CEH training is a must for (aspiring) ethical hackers; system and network administrators; information systems security engineers and managers; IT auditors; information security analysts and administrators; information security professionals and officers; Information Assurance (IA) security officers; risk/threat/vulnerability analysts and many other security professionals.

About EC-Council

EC-Counsil - IMF AcademyEC-Council is the world's largest cyber security technical certification body and operates in more than 145 countries globally. EC-Council has trained and certified over 200,000 information security professionals worldwide. EC-Council is the owner and developer of a.o. the worldwide known Certified Ethical Hacker (CEH) certification, the C/CISO (Certified Chief Information Security Officer) certification and the Certified Threat Intelligence Analyst (C/TIA) certification.



Agenda


Now in its 11th version, CEH continues to evolve with the latest operating systems, tools, tactics, exploits, and technologies. You will learn about:

  • Information security controls, laws, and standards
  • Various types of footprinting, footprinting tools, and countermeasures
  • Network scanning techniques and scanning countermeasures
  • Enumeration techniques and enumeration countermeasures
  • Vulnerability analysis to identify security loopholes in the target organization's network, communication infrastructure, and end systems
  • System hacking methodology, steganography, steganalysis attacks, and covering tracks to discover system and network vulnerabilities
  • Different types of malware (Trojan viruses, worms, etc.), system auditing for malware attacks, malware analysis, and countermeasures
  • Packet sniffing techniques to discover network vulnerabilities and countermeasures to defend against sniffing
  • Social engineering techniques and how to identify theft attacks to audit human-level vulnerabilities and social engineering countermeasures
  • DoS/DDoS attack techniques and tools to audit a target and DoS/DDoS countermeasures
  • Session hijacking techniques to discover network-level session management, authentication/authorization, and cryptographic weaknesses and countermeasures
  • Webserver attacks and a comprehensive attack methodology to audit vulnerabilities in webserver infrastructure, and countermeasures
  • Web application attacks, comprehensive web application hacking methodology to audit vulnerabilities in web applications, and countermeasures
  • SQL injection attack techniques, injection detection tools to detect SQL injection attempts, and countermeasures
  • Wireless encryption, wireless hacking methodology, wireless hacking tools, and wi-fi security tools
  • Mobile platform attack vector, Android vulnerability exploitations, and mobile security guidelines and tools
  • Firewall, IDS and honeypot evasion techniques, evasion tools and techniques to audit a network perimeter for weaknesses, and countermeasures
  • Cloud computing concepts (container technology, serverless computing), the working of various threats and attacks, and security techniques and tools
  • Penetration testing, security audit, vulnerability assessment, and penetration testing roadmap
  • Threats to IoT and OT platforms and defending IoT and OT devices
  • Cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools

Event Categories
COMPUTERS AND INTERNET CONFERENCES
,
Technology
Keywords: network , professional, analysis, access , applications, databases, environment, Financial , iOS, technical




Comments








Events Calendar

SunMonTueWedThuFriSat
31 1 2 3 4 5 6
7 8 9 10 11 12 13
14 15 16 17 18 19 20
21 22 23 24 25 26 27
28 29 30 31 1 2 3

Event Location

Newsletters

VIP Life Time Subscription to our Newsletters!
$399.99
$299.99