¿Qué quieres aprender?

Certified Professional Ethical Hacker

Certified Professional Ethical Hacker

Sicap

Curso presencial

Miguel Hidalgo (México)


2.809
+ IVA

Duración : 5 Días

The CPEH certification training enables students to understand the importance of vulnerability assessments by providing industry knowledge and skills in Vulnerability Assessments. In doing so, the CPEH student is able to understand how malware and destructive viruses function. In addition, the CPEH course helps students learn how to implement counter response and preventative measures when it comes to a network hack. The CPEH course provides in-depth labs that focus on both open source and commercial based tools with industry best practices. These hands on labs emulate real world hacking scenarios and equip the candidate to assess your company’s security

posture, help implement controls to better secure your company’snetwork infrastructure and how to combat against hackers and/or viruses, etc.

¿Quieres hablar con un asesor sobre este curso?

Sedes

Localización

Fecha inicio

Miguel Hidalgo

A quién va dirigido

• Information System Owners • Security Officers • Ethical Hackers • Information Owners • Penetration Testers • System Owner and Managers • Cyber Security Engineers

Requisitos

VA, S.

Temario completo de este curso

Course Outline

· Security Fundamentals

§ Overview

§ The Growth of

§ Environments and Security

§ Our Motivation…

§ The Goal: Protecting Information!

§ CIA Triad in Detail

§ Approach Security Holistically

§ Security Definitions

§ Definitions Relationships

§ Method: Ping

§ The TCP/IP Stack

§ Which Services Use Which Ports?

§ TCP 3-Way Handshake

§ TCP Flags

§ Malware

§ Types of Malware

§ Types of Malware Cont...

§ Types of Viruses

§ More Malware: Spyware

§ Trojan Horses

§ Back Doors

§ DoS

§ DDoS

§ Packet Sniffers

§ Passive Sniffing

§ Active Sniffing

§ Firewalls, IDS and IPS

§ Firewall – First

§ Line of Defense

§ IDS – Second Line of Defense

§ IPS – Last Line of Defense?

§ Firewalls

§ Firewall Types:

§ (1) Packet Filtering

§ Firewall Types:

§ (2) Proxy Firewalls

§ Firewall Types –

§ Circuit-Level Proxy Firewall

§ Type of Circuit-

§ Level Proxy – SOCKS

§ Firewall Types –

§ Application-Layer Proxy

§ Firewall Types: (3) Stateful

§ Firewall Types:

§ (4) Dynamic Packet-Filtering

§ Firewall Types:

§ (5) Kernel Proxies

§ Firewall Placement

§ Firewall Architecture

§ Types – Screened Host

§ Multi- or Dual-Homed

§ Screened Subnet

§ Wi-Fi Network Types

§ Wi-Fi Network Types

§ Widely Deployed Standards

§ Standards Comparison

§ 802.11n - MIMO

§ Overview of Database Server

§ Review

· Access Controls

§ Overview

§ Role of Access Control

§ Definitions

§ More Definitions

§ Categories of Access Controls

§ Physical Controls

§ Logical Controls

§ “Soft” Controls

§ Security Roles

§ Steps to Granting Access

§ Access Criteria

§ Physical Access

§ Control Mechanisms

§ Biometric System Types

§ Synchronous Token

§ Asynchronous Token Device

§ Memory Cards

§ Smart Card

§ Cryptographic Keys

§ Logical Access Controls

§ OS Access Controls

§ Linux Access Controls
§ Accounts and Groups

Ver más