EC-Council

Certified Ethical Hacker (CEH) v9 Technology Course GNS3 Discount


This course is included in our All Access Pass! Get unlimited streaming access to 12,000+ videos, workbooks, and practice exams by starting your free trial of the All Access Pass subscription!
Start Your FREE Trial!


Course Description

Pre-Order the Full Series Including All 18 Modules!!!

 

Use Promo Code GNS350OFF at checkout to receive discount!

 

As an industry leader in online training for numerous I.T certifications and disciplines, INE is now releasing its complete 18-module course for the Certified Ethical Hacker certification.

This series will prepare you to understand both the theoretical and practical aspects of offensive security and prepare you to obtain the CEH certification that's regarde by both the private sector and the government when hiring security engineers and consultants.

The completed series will take you through the hacking lifecycle, from the initial research activities to the exploitation and owning of private systems and networks using diverse techniques and tools. Included in each module are questions to validate your knowledge and throughout the different demonstration labs which are easy to set up with a home computer or a laptop, you will get the experience needed to consolidate your new skills.

This series is taught by instructor Josué Vargas (CCNP R&S, CCDP, CCNA Security, JNCIP-ENT, JNCIP-SEC and CEH). Josue is an international consultant in the areas of Networking and Security and owner of Netquarks Technologies.

 

Currently Release Modules:

1 :: Introduction To Ethical Hacking
2 :: Footprinting And Reconnaissance
3 :: Scanning Networks
4 :: Enumeration
5 :: System Hacking
6 :: Malware Threats

 

Future Modules:

7 :: Sniffing
8 :: Social Engineering
9 :: Denial of Service
10 :: Session Hijacking
11 :: Hacking Webservers
12 :: Hacking Web Applications
13 :: SQL Injection
14 :: Hacking Wireless Networks
15 :: Hacking Mobile Platforms
16 :: Evading IDS, Firewalls, and Honeypots
17 :: Cloud Computing
18 :: Cryptography

 


If you would like more information on how to purchase this course individually, contact a Training Specialist.