Certified Professional Ethical Hacker

Curso

En Miguel Hidalgo (México)

2.807,41 € + IVA

*Precio Orientativo

Importe original en USD:

$ 3.000

Más información

¿Necesitas un coach de formación?

Te ayudará a comparar y elegir el mejor curso para ti y a financiar tu matrícula en cómodos plazos.

900 49 49 40

Llamada gratuita. Lunes a Viernes de 9h a 20h.

Descripción

  • Tipología

    Curso

  • Lugar

    Miguel hidalgo (México)

  • Horas lectivas

    35h

  • Duración

    5 Días

  • Inicio

    Fechas a elegir

Mile2

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security
posture, help implement controls to better secure your company’snetwork infrastructure and how to combat against hackers and/or viruses, etc.

Instalaciones y fechas

Ubicación

Inicio

Miguel Hidalgo (México)
Ver mapa
Bosque de Duraznos 65-601a, Col. Bosque de Las Lomas, 11700

Inicio

Fechas a elegirMatrícula abierta

A tener en cuenta

• Information System Owners
• Security Officers
• Ethical Hackers
• Information Owners
• Penetration Testers
• System Owner and Managers
• Cyber Security Engineers

VA, S.

Preguntas & Respuestas

Añade tu pregunta

Nuestros asesores y otros usuarios podrán responderte

¿Quién quieres que te responda?

Déjanos tus datos para recibir respuesta

Sólo publicaremos tu nombre y pregunta

Opiniones

Materias

  • Firewall
  • Proxy
  • TCP
  • Electrónica de microprocesadores
  • Servidor de contenidos
  • Seguridad en internet
  • Seguridad de redes
  • Seguridad informatica
  • Redes
  • Instalación
  • Seguridad
  • Informática Aplicada
  • Redes de datos
  • Computadoras
  • Conectividad redes
  • Redes digitales

Temario

Course Outline

· Security Fundamentals

§ Overview

§ The Growth of

§ Environments and Security

§ Our Motivation…

§ The Goal: Protecting Information!

§ CIA Triad in Detail

§ Approach Security Holistically

§ Security Definitions

§ Definitions Relationships

§ Method: Ping

§ The TCP/IP Stack

§ Which Services Use Which Ports?

§ TCP 3-Way Handshake

§ TCP Flags

§ Malware

§ Types of Malware

§ Types of Malware Cont...

§ Types of Viruses

§ More Malware: Spyware

§ Trojan Horses

§ Back Doors

§ DoS

§ DDoS

§ Packet Sniffers

§ Passive Sniffing

§ Active Sniffing

§ Firewalls, IDS and IPS

§ Firewall – First

§ Line of Defense

§ IDS – Second Line of Defense

§ IPS – Last Line of Defense?

§ Firewalls

§ Firewall Types:

§ (1) Packet Filtering

§ Firewall Types:

§ (2) Proxy Firewalls

§ Firewall Types –

§ Circuit-Level Proxy Firewall

§ Type of Circuit-

§ Level Proxy – SOCKS

§ Firewall Types –

§ Application-Layer Proxy

§ Firewall Types: (3) Stateful

§ Firewall Types:

§ (4) Dynamic Packet-Filtering

§ Firewall Types:

§ (5) Kernel Proxies

§ Firewall Placement

§ Firewall Architecture

§ Types – Screened Host

§ Multi- or Dual-Homed

§ Screened Subnet

§ Wi-Fi Network Types

§ Wi-Fi Network Types

§ Widely Deployed Standards

§ Standards Comparison

§ 802.11n - MIMO

§ Overview of Database Server

§ Review

· Access Controls

§ Overview

§ Role of Access Control

§ Definitions

§ More Definitions

§ Categories of Access Controls

§ Physical Controls

§ Logical Controls

§ “Soft” Controls

§ Security Roles

§ Steps to Granting Access

§ Access Criteria

§ Physical Access

§ Control Mechanisms

§ Biometric System Types

§ Synchronous Token

§ Asynchronous Token Device

§ Memory Cards

§ Smart Card

§ Cryptographic Keys

§ Logical Access Controls

§ OS Access Controls

§ Linux Access Controls
§ Accounts and Groups

Más información

¿Necesitas un coach de formación?

Te ayudará a comparar y elegir el mejor curso para ti y a financiar tu matrícula en cómodos plazos.

900 49 49 40

Llamada gratuita. Lunes a Viernes de 9h a 20h.

Certified Professional Ethical Hacker

2.807,41 € + IVA

*Precio Orientativo

Importe original en USD:

$ 3.000