Certified Professional Ethical Hacker
Curso
En Miguel Hidalgo
*Precio estimado
Importe original en USD:
$ 3,000
¿Necesitas un coach de formación?
Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.
Descripción
-
Tipología
Curso
-
Nivel
Nivel intermedio
-
Lugar
Miguel hidalgo
-
Horas lectivas
35h
-
Duración
5 Días
-
Inicio
Fechas disponibles
The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security
posture, help implement controls to better secure your company’snetwork infrastructure and how to combat against hackers and/or viruses, etc.
Precisiones importantes
Documentos
- PEH_Certified_Professional_Ethical_Hacker.pdf
Sedes y fechas disponibles
Ubicación
Inicio
Inicio
Acerca de este curso
• Information System Owners
• Security Officers
• Ethical Hackers
• Information Owners
• Penetration Testers
• System Owner and Managers
• Cyber Security Engineers
VA, S.
Opiniones
Materias
- Seguridad de redes
- Seguridad
- Informática aplicada
- Redes
- Computadoras
- Conectividad redes
- Redes de datos
- Redes digitales
- Seguridad informática
- Servidor de contenidos
- Electrónica de microprocesadores
- Instalación
- Seguridad en internet
Profesores
Hector Solis
Gerente de TI
Programa académico
Course Outline
· Security Fundamentals
§ Overview
§ The Growth of
§ Environments and Security
§ Our Motivation…
§ The Goal: Protecting Information!
§ CIA Triad in Detail
§ Approach Security Holistically
§ Security Definitions
§ Definitions Relationships
§ Method: Ping
§ The TCP/IP Stack
§ Which Services Use Which Ports?
§ TCP 3-Way Handshake
§ TCP Flags
§ Malware
§ Types of Malware
§ Types of Malware Cont...
§ Types of Viruses
§ More Malware: Spyware
§ Trojan Horses
§ Back Doors
§ DoS
§ DDoS
§ Packet Sniffers
§ Passive Sniffing
§ Active Sniffing
§ Firewalls, IDS and IPS
§ Firewall – First
§ Line of Defense
§ IDS – Second Line of Defense
§ IPS – Last Line of Defense?
§ Firewalls
§ Firewall Types:
§ (1) Packet Filtering
§ Firewall Types:
§ (2) Proxy Firewalls
§ Firewall Types –
§ Circuit-Level Proxy Firewall
§ Type of Circuit-
§ Level Proxy – SOCKS
§ Firewall Types –
§ Application-Layer Proxy
§ Firewall Types: (3) Stateful
§ Firewall Types:
§ (4) Dynamic Packet-Filtering
§ Firewall Types:
§ (5) Kernel Proxies
§ Firewall Placement
§ Firewall Architecture
§ Types – Screened Host
§ Multi- or Dual-Homed
§ Screened Subnet
§ Wi-Fi Network Types
§ Wi-Fi Network Types
§ Widely Deployed Standards
§ Standards Comparison
§ 802.11n - MIMO
§ Overview of Database Server
§ Review
· Access Controls
§ Overview
§ Role of Access Control
§ Definitions
§ More Definitions
§ Categories of Access Controls
§ Physical Controls
§ Logical Controls
§ “Soft” Controls
§ Security Roles
§ Steps to Granting Access
§ Access Criteria
§ Physical Access
§ Control Mechanisms
§ Biometric System Types
§ Synchronous Token
§ Asynchronous Token Device
§ Memory Cards
§ Smart Card
§ Cryptographic Keys
§ Logical Access Controls
§ OS Access Controls
§ Linux Access Controls
§ Accounts and Groups
¿Necesitas un coach de formación?
Te ayudará a comparar y elegir el mejor curso para ti y a financiarlo en cómodas cuotas mensuales.
Certified Professional Ethical Hacker
*Precio estimado
Importe original en USD:
$ 3,000