During this 5-day lab intensive course, candidates will be immersed into an interactive environment where they will learn how perimeter defenses work and then be lead into scanning and attacking their own networks. No real network is harmed. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation. When a student leaves this intensive 5 day class, they will have hands-on understanding and experience in Ethical Hacking.
Learning Objectives
Obtaining the CEH Certification. Students then learn how intruders escalate privileges and what steps can be taken to secure a system. Students will also learn about Intrusion Detection, Policy Creation, Social Engineering, DDoS Attacks, Buffer Overflows and Virus Creation.