Search results for:
No result found! Try with different keywords!
Users
Organizers
Events
Advertisement

2019 Certified Ethical Hacker Classes @theClubhou.se

Advertisement

2019 Certified Ethical Hacker Classes @theClubhou.se




Registration now open.  Only 20 slots available, so register soon!

theClubhou.se presents...in partnership with Palmetto Cyber

Certified Ethical Hacker (CEH) Preparation Course  -

 

“To beat a hacker, you need to think like a hacker”  

A Certified Ethical Hacker is a skilled professional who understands and knows how to look for weaknesses and vulnerabilities in target systems and uses the same knowledge and tools as a malicious hacker, but in a lawful and legitimate manner to assess the security posture of a target system(s). The CEH credential certifies individuals in the specific network security discipline of Ethical Hacking from a vendor-neutral perspective.

This program is the pinnacle of the most desired information security training program any information security professional will ever want to be in. To master the hacking technologies, you will need to become one, but an ethical one! The accredited course provides the advanced hacking tools and techniques used by hackers and information security professionals alike to break into an organization. 

All materials and exam are included in the cost of this program. Upon completion of this program, you will sit for the Certified Ethical Hacker (CEH) Exam 312-50 which is overseen by our proctor.

What You'll Learn...

This program will immerse you into the Hacker Mindset so that you will be able to defend against future attacks. The security mindset in any organization must not be limited to the silos of a certain vendor, technologies or pieces of equipment. 

Upon completion of this program, you will know...


Key issues plaguing the information security world, incident management process, and penetration testing

Various types of footprinting, footprinting tools, and countermeasures

Network scanning techniques and scanning countermeasures

System hacking methodology, steganography, steganalysis attacks, and covering tracks

Different types of Trojans, Trojan analysis, and Trojan countermeasures

Working of viruses, virus analysis, computer worms, malware analysis procedure, and countermeasures

Packet sniffing techniques and how to defend against sniffing

Social Engineering techniques, identify theft, and social engineering countermeasures

DoS/DDoS attack techniques, botnets, DDoS attack tools, and DoS/DDoS countermeasures

Session hijacking techniques and countermeasures

Different types of webserver attacks, attack methodology, and countermeasures

Different types of web application attacks, web application hacking methodology, and countermeasures

SQL injection attacks and injection detection tools

Wireless Encryption, wireless hacking methodology, wireless hacking tools, and wi- security tools

Mobile platform attack vector, android vulnerabilities, jailbreaking iOS, windows phone 8 vulnerabilities, mobile security guidelines, and tools

Firewall, IDS and honeypot evasion techniques, evasion tools, and countermeasures

Various cloud computing concepts, threats, attacks, and security techniques and tools

Different types of cryptography ciphers, Public Key Infrastructure (PKI), cryptography attacks, and cryptanalysis tools

Various types of penetration testing, security audit, vulnerability assessment, and penetration testing roadmap


Materials Included...


EC-Council CEH e-Courseware and iLabs Subscription 

CEH Certified Ethical Hacker Bundle, Third Edition (All-in-One) 3rd Edition by Matt Walker


All of the domains from the Exam Blueprint are covered  https://cert.eccouncil.org/images/doc/CEH-Exam-Blueprint-v2.0.pdf





Class Date



Time



Planned Activity





Mon Mar 18



6 pm - 9 pm



Introduction/ Registration/Essential Knowledge





Tue Mar 19



6 pm - 9 pm



Reconnaissance





Wed Mar 20



6 pm - 9 pm



Scanning & Enumeration





Thu Mar 21



6 pm - 9 pm



Sniffing & Evasion





Fri Mar 22



6 pm - 9 pm



Attacking a System





Sat Mar 23



10 am - 2 pm



Web-Based Hacking





Mon Mar 25



6 pm - 9 pm



Wireless Hacking





Tues Mar 26



6 pm - 9 pm



Security in Cloud Computing





Wed Mar 27



6 pm - 9 pm



Trojans & Other Attacks





Thu Mar 28



6 pm - 9 pm



Cryptography/ Chpt 11 Social Engineering





Fri Mar 29



6 pm - 9 pm



The Pen Test/ Course review





Sat Mar 30



10 am - 2 pm



Certification Exam





 

  

FAQs

 Are there ID or minimum age requirements to enter the event?

No, everyone is welcome. 

 What are my transportation/parking options for getting to and from the event?

Free street parking after 5 pm and on weekends.  Paid parking is avaiable at parking decks behind Marriott and on 9th Street. 

What can I bring into the event?

Computers are available but feel free to bring any note taking material. 

 How can I contact the organizer with any questions?

Via email aGV5YSB8IHRoZUNsdWJob3UgISBzZQ== Attn: Cyber Classes

Do I have to bring my printed ticket to the event?

No, we will have your registratoin information already. 

 



You may also like the following events from theClubhou.se:

Map Georgia Cyber Center Hull Mcknight Building, 100 Grace Hopper Lane, Augusta, United States
Loading venue map..
Event details from Report a problem

Are you going to this event?

Advertisement

More Events in Augusta

Explore More Events in Augusta