Who is a Certified Ethical Hacker?
A Certified Ethical Hacker is a specialist typically working in a red team environment, focused on attacking computer systems and gaining access to networks, applications, databases, and other critical data on secured systems. A CEH understands attack strategies, the use of creative attack vectors, and mimics the skills and creativity of malicious hackers. Unlike malicious hackers and actors, Certified Ethical Hackers operate with permission from the system owners and take all precautions to ensure the outcomes remain confidential. Bug bounty researchers are expert ethical hackers who use their attack skills to uncover vulnerabilities in the systems.
Before attending this accelerated ethical hacking course, you should hold two years’ IT work experience and possess a basic familiarity of Linux and/or Unix. We also recommend you possess a strong working knowledge of:
Learners will not be able to access the EC Council CEHv11 course material until they receive their login details, which they are given on the first day of the course.
Introduction to Ethical Hacking
Footprinting and Reconnaissance
Evading IDS, Firewalls, and Honeypots
Hacking Web Servers
Hacking Web Applications
Hacking Wireless Networks
Hacking Mobile Platforms
IoT and OT Hacking
Join our public courses in our Istanbul, London and Ankara facilities. Private class trainings will be organized at the location of your preference, according to your schedule.