Select Page

C|EH Specialty Expert in Ethical Hacking Cyberattack

The course certifies you for work as a Cybersecurity manager of a company. Learn the process of ethical penetration testing, information gathering, vulnerabilities, social engineering, session hijacking, attacks, control bypass, web applications, wireless networks, mobile devices, cloud infrastructure, and more.

C|EH

 

SUBSIDIZED FOR WORKERS

REQUEST MORE INFORMATION

     

    The course covers the Five Phases of Hacking:

    1.- Recognition. 2.- Access. 3.- Enumeration. 4.- Access Maintenance. 5.- Erasing Traces.
    Practice the main and most current vulnerabilities live with real machines in more than 220 labs in a virtualized environment and 3,500 hacking tools on various operating systems.


    The salary of an Ethical Hacker in Spain ranges between 30,000 and 60,000 euros per year.

     

      Demo Video
      Infórmate Infórmate

      Syllabus

      C|EH

          • Identification, authentication and authorization.
          • Network defense administrative controls.
          • Technical and network defense controls.
          • Best practices for virtualization and cloud computing.
          • Wireless networking fundamentals, types of wireless encryption, and security measures.
          • Mobile and IoT device security.
          • Cryptographic techniques, cryptographic algorithms and PKI public key infrastructure.
          • Data security concepts, data encryption, and data loss prevention.
          • IoT and OT network traffic monitoring.
          • Threats and countermeasures of cloud computing.
          • Fundamentals of penetration testing.
          • Footprinting and Recognition.
          • Network Scanning.
          • Enumeration
          • Malware threats.
          • Sniffing.
          • Social engineering.
          • Denial of service.
          • Session hijacking.
          • Evade IDS, Firewalls and Honeypots.
          • Hacking Web Servers and Web Applications.
          • SQL injection.
          • Hacking Wireless Networks and Mobile Platforms.
          • IoT and OT Hacking.
          • Cloud Computing.
          • Cryptography.

           

          Official Certification

              • Final Project.
              • Official Certification Masterclass.