Course Duration
40 hours (5 days)
Course Fees
S$2,750.00/- per pax (GST Incl.)
Offer fee $2,500 is applicable during public holidays
Venue
Main Office (Bendemeer)
20 Bendemeer Road, #04-06 BS Bendemeer Centre, Singapore 339914
More Information
Medium: English
Attendance: 100%
Written Test Pass percentage: 70%
CEH is the world’s most advanced certified ethical hacking course that covers 18 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization.
Course Description
The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals.
CEH is the world’s most advanced certified ethical hacking course that covers 18 of the most current security domains any individual will ever want to know when they are planning to beef up the information security posture of their organization.
The accredited course provides advanced hacking tools and techniques used by hackers and information security professionals.
Course Outline
• Introduction to ethical hacking
• Footprinting and reconnaissance
• Scanning networks
• Enumeration
• Sniffing
• System hacking
• Malware threats
• Social engineering
• Denial of service
• Session hijacking
• Hacking web applications
• SQL injection
• Hacking wireless networks
• Hacking web servers
• Hacking mobile platforms
• Evading IDS, Firewalls, and Honeypot
• Cloud computing
• Cryptography
Key Outcomes
• A thorough introduction to ethical hacking
• Exposure to threat vectors and counter-measures
• Addresses emerging areas of cloud and mobile hacking
• Prepares you to combat Trojans, malware, backdoors and more
• Enables you to hack using mobile
Exam Information
• Number of questions: 125
• Test duration: 4 Hours
• Test format: Multiple choices
• Test delivery: ECC exam, VUE
• Exam prefix: 312-50 (ECC exam), 312-50 (VUE)
Target Audience
This course will significantly benefit security officers, auditors, security professionals, site administrators, and anyone who is concerned about the integrity of their network infrastructure.