IIHT
Follow us:

Courses

CYBER SECURITY

The Certified Ethical Hacker (CEH) provides an in-depth understanding of ethical hacking phases, various attack vectors, and preventative countermeasures. It will teach you how hackers think and act so you will be better positioned to set up your security infrastructure and defend against attacks.

  • Introduction to Ethical Hacking
  • Footprinting and Scanning
  • Enumeration
  • System Hacking and Trojans
  • Denial of Service and Sniffers
  • Session Hijacking and Hacking Web Servers
  • Web Application Vulnerabilities and Web Techniques Based Password Cracking
  • Injection and Hacking Wireless Networks
  • Viruses, Worms and Physical Security
  • Linux Hacking
  • Evading IDS and Firewalls
  • Buffer Overflows and Cryptography
  • Penetrating Testing
  • Exploit Writing and Reverse Engineering.